1. Computing

Information Leakage From 'Google Hacking'

By January 15, 2007

Follow me on:

You may think that your policies, procedures, tools, techniques and appliances are enough to secure and protect your data. You would probably be dumbfounded to find out just how much data- confidential, private, sensitive data that nobody has any business seeing- is available via the Web if you just know the right search term syntax to use. To learn more about the problem of information leakage, how to determine if your data is at risk, and steps to take to secure your data and remove it from Web search engines, read Information Leakage: Protect Against 'Google Hacking'.
Comments are closed for this post.
Leave a Comment

Line and paragraph breaks are automatic. Some HTML allowed: <a href="" title="">, <b>, <i>, <strike>

©2014 About.com. All rights reserved.