This tip is part of SearchSecurity.com's Data Protection Security School lesson, Enterprise strategies for protecting data at rest. Visit the lesson page for more learning resources.
If you answered two or more questions incorrectly, revisit the materials from the lesson Enterprise strategies for protecting data at rest:
Tip: Discovering e-discovery: How information security pros should prepare
Podcast: Countdown - Top five ways to get storage and security teams working together
If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.