In the second part of our series on information security, we set out the next step for you to consider: Where is your most valuable and sensitive information? You have to secure that information everywhere it is located across a wide variety of forms, including paper, digital, and mental. If you are unable to locate this information, then you cannot expect to secure it.
In the first part of our new series on information security, we set out a simple approach to help you archive, back up or destroy a lot of the information that may be causing you concerns. You can then focus your energy (and limited resources) on rolling out appropriate security measures for the most valuable and sensitive information that you work with.