Why do we all go through so much trouble to keep our information assets protected? Earlier in the book, we emphasized the principal role of information security: to ensure availability. If information is not available to employees , to partners , to customers, who cares about the rest of the security?
As important as availability is, keeping your data protected is a similarly-important goal. Availability presents risks: people can access your data. Alas, not everyone with access necessarily shares our goal. And as access becomes more pervasive, with varying levels and multiple methods from disparate locations, protecting the actual data itself becomes increasingly important. Consider processes and technologies that can help you improve the security of the information you generate, gather, process, and store in the routine of your business.