MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
CIO
May 15, 2003
Scott Berinato
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
IndustryWeek
March 1, 2006
Doug Bartholomew
Responding To Risk: Invisible Enemies Manufacturers must find ways to prevent electronic threats to their networks and data. mark for My Articles similar articles
InternetNews
June 6, 2009
Alex Goldman
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
PHONE+
Mitchell Hershkowitz
Best Practices for Managing Communications Services -- Phase 2: Management In the second of a three-part series exploring best practices for assisting organizations with managing their communication services, we explore the Management Phase, which includes ongoing visibility and improvement of their communication services. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
Bio-IT World
September 11, 2003
Philip D. Quarles
Safeguarding the Security of Clinical Data Given the frequency of Web site attacks, can data be safely stored on a server connected to the Internet? Yes, provided that the application is properly designed and the network and server properly secured. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
IndustryWeek
December 16, 2005
Tying Supply Chain To Customers How Dell succeeds in an increasingly competitive market. mark for My Articles similar articles
HRO Today
Jan/Feb 2008
Chris Johnson
Gauging Service Delivery Quality as Judged by Your Employees HR outsourcing is not consistently delivering the level of service employees expect. mark for My Articles similar articles
CIO
August 1, 2003
Bob Violino
Patching Things Up The latest patch management tools can help reduce costs and increase reliability. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
InternetNews
January 19, 2010
Lincoln Financial Breach Puts 1.2M Users at Risk The financial services company admitted last week that the sharing of usernames and passwords among employees created a security breach that compromised more than 1.2 million customers' personal data. mark for My Articles similar articles
PC World
May 2003
Daniel Tynan
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
National Defense
January 2015
J. Michael Gilmore
History of U.S. Weapons Proves Value of Realistic Operational Testing Recently, there has been criticism that operational testing drives substantial cost increases and schedule slippage in programs and that its scope should be limited. The facts do not support these beliefs. mark for My Articles similar articles
InternetNews
June 14, 2005
Jim Wagner
Microsoft Plugs 10 on Patch Tuesday Microsoft announced patches to correct vulnerabilities addressed in 10 security bulletins, three of them critical. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
Food Processing
October 2010
MRO Q&A: Why Do Good Plants Go Down? From a macro perspective the top three major shutdown threats for a food plant could be summarized as: a catastrophic event, a facility's internal operational failure or a facility's external operational failure. mark for My Articles similar articles
InternetNews
November 11, 2008
Andy Patrizio
Teed Up for November: Office, Windows Fixes Patch Tuesday, Microsoft's monthly ritual of issuing fixes on the second Tuesday of every month, is a modest affair this month, with only two fixes coming out. But they affect both Windows and Office. mark for My Articles similar articles
CIO
April 15, 2003
The Earliest Adopter Microsoft's IT boss is the first to install, the first to deploy and the first to judge. Consequently, he's learned a little bit about rollouts. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
PC Magazine
March 20, 2009
Neil J. Rubenking
LastPass 1.50 LastPass manages your log-in passwords and fills in Web forms. It outperforms the competition in almost every area, and it's free!... RoboForm Pro 6.0... Eikon To Go Digital Privacy Manager... mark for My Articles similar articles
InternetNews
August 10, 2006
Andy Patrizio
To Patch Or Not To Patch? Microsoft issues a fix to a severe hole. The government insists we use it, but is there a risk? mark for My Articles similar articles
HBS Working Knowledge
June 27, 2005
Barber & Strack
People Power: How to Measure It Start with the right set of performance indicators. mark for My Articles similar articles
PC Magazine
June 1, 2008
Matthew D. Sarrel
Server Starter Guide Setting up your first server isn't too difficult, but it does require some forethought and planning. mark for My Articles similar articles
PC World
June 2004
Stuart J. Johnston
Worms Come Faster: Are You at Risk? Play it safe and install the latest Outlook and MSN Messenger updates to protect against the new worms. mark for My Articles similar articles
InternetNews
October 8, 2009
Stuart J. Johnston
Microsoft's Newest Biggest Bug Patch Ever Microsoft will use Tuesday Patches to fix two zero-day holes. mark for My Articles similar articles