Datasheet
productive — do our taxes, our budgets, process medical claims, do online
banking, and more. I’m not suggesting that you not use your computer this
way, but I am suggesting that you take protecting your personal data seriously.
The market for your personal information has never been greater. Crooks
who don’t use it themselves can get a nice price for it on the black market,
selling it on the Internet in just a matter of minutes. This means that you must
protect your personal information that resides on your computer ferociously.
Luckily, with the help of Vista and this book, you’ll be able to do just that.
Sensitive information from work
You’re not the only one that has sensitive information; corporations also
have proprietary business information that is as sensitive to the business as
your PII is to you. This proprietary business information might include, but is
not limited to
Physical security: As a trusted employee or business owner, you might
have access codes to offices, safes, alarm codes, or other information
related to physical security at your workplace saved on your computer.
Customer or sales information: Employee computers commonly have
sensitive contract information, customer databases, rate schedules, and
sales and marketing information.
Vendor information: Such data might be information regarding vendor
supply terms, contact information, or other information that pertains to
various vendors and suppliers that should not be public knowledge.
Employment-related information: Such data might include payroll infor-
mation, healthcare plan information, or personal information of other
employees of a business.
Trade secrets: Certain employees might have digital research data,
patent, or design information on their computer systems that they want
to protect from their competitors.
Company financials or assets: This information could be the financials of
the company, business tax information, departmental budget information,
or information on other physical or intellectual assets.
As an employee or business owner, you might either now or later have sensitive
information from work on your computer — and you need to understand how
to secure it. With the help of Vista, perhaps some third-party tools, and this
book, you will have everything that you need to amply secure this information.
21
Chapter 1: Getting Up to Speed on Vista Security
05_118054 ch01.qxp 10/11/07 9:38 AM Page 21