In this technology-dependent business environment, a company's IT administrators might be the most popular people in the room. However, in light of high-profile information leaks by a National Security Agency contractor, IT administrators might also be the most suspect. This article discusses precautions government agencies and companies are taking to protect sensitive information.

Related Summaries