According to Harkins, there are five irrefutable laws of information security that can help us frame risk more effectively and protect the precious data that increasingly lands on our endpoint devices.
Source and original content: http://blog.lumension.com/?p=3352 [3]
Links:
[1] http://pulse.veltsos.com/category/it/data
[2] http://pulse.veltsos.com/category/it/security
[3] http://blog.lumension.com/?p=3352