MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
PC Magazine
February 1, 2006
Oliver Kaven
Protect Your Business Small businesses have less to protect, but that doesn't mean less to lose: A single attack can cost them everything. mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
Entrepreneur
April 2004
Bender, Clancy, & Kooser
Secure Horizons Are worries about spam, viruses and hackers keeping you up at night? Our Internet security guide will help you protect the future of your business so you can sleep soundly. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
PC Magazine
February 1, 2008
Matthew D. Sarrel
Unified Threat Management A single interface to protect your network makes good sense. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
CIO
January 15, 2007
Galen Gruman
Mobile Mastery Treos, BlackBerrys and smart phones don't have to wreak havoc on enterprise IT. Here's how to keep users happy, data secure and costs in check. mark for My Articles similar articles
HBS Working Knowledge
June 30, 2003
Austin & Darby
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
PC Magazine
August 3, 2004
Security Checklist Follow this computer security checklist to keep your business safe. mark for My Articles similar articles
InternetNews
August 16, 2004
Jim Wagner
Postini Beefs Up Perimeter Defenses The managed e-mail security firm adds features that free administrators of much of the hassle in dealing with spam while giving individual users more control over their settings. mark for My Articles similar articles
CIO
June 29, 2011
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. mark for My Articles similar articles
T.H.E. Journal
April 2004
Jim Myers
Security Software Enriches Troy City Schools Educational Experience by Providing Safe E-Mail To address the requirement of schools to block and monitor all e-mail originating both internally and externally, anti-spam technology has emerged as a vital tool. mark for My Articles similar articles
PC Magazine
December 22, 2004
Michael J. Miller
The Agenda for 2005 This month marks the 30th anniversary of the modern personal computer... Fight spam... Improve security... Protect users' rights... Protect and expand Internet connections... Gadget of the Month: HP's Digital Entertainment Center... etc. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
PC Magazine
January 26, 2005
Matthew D. Sarrel
Lock Down Your E-Mail Businesses that live and die by e-mail have to get serious about keeping it safe. If you're concerned about viruses that can overload your servers, legal and regulatory liability for message content, and an ever-growing deluge of spam, read on. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
IndustryWeek
October 1, 2006
Doug Bartholomew
Supply Chains at Risk Manufacturers need to guard against disruptions in the flow of materials. With so many things that can -- and do -- go wrong, contingency planning is no longer a luxury. It's a necessity. mark for My Articles similar articles
PC Magazine
July 16, 2007
Neil J. Rubenking
Yoggie Pico Personal We love the idea: enterprise-style security on a tiny, dedicated computer. The question is, does it work? mark for My Articles similar articles
InternetNews
August 30, 2005
The Pain in the Endpoints A study by SupportSoft says mobile devices are a pain in the IT department's neck. mark for My Articles similar articles
PC World
July 2005
Scott Dunn
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... mark for My Articles similar articles
PC World
June 2006
Andrew Brandt
New Devices Promise Protection in a Box These security gateways claim to stop threats before they reach your network. Netgear WGT624SC Super G Wireless Router... the Spam Cube... TrustEli Eli Security Appliance... mark for My Articles similar articles
Bank Technology News
September 2008
Tom Kellermann
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. mark for My Articles similar articles
CFO
October 1, 2004
Russ Banham
The Enemy Within When it comes to combating worms, Trojan horses, and viruses, technology alone is not enough. Human error can undo almost any firewall or safeguard. Yet in some cases the fixes are remarkably simple. mark for My Articles similar articles
Inc.
October 2005
John Fried
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. mark for My Articles similar articles
PC Magazine
November 11, 2003
Larry J. Seltzer
Enterprise Spam Tools: Several Approaches, Including Some That Work Client-side spam utilities like Norton AntiSpam 2004 are fine for home users, but any business large enough to have a mail server needs something more: a server-side solution that traps spam before it hits employees' in-boxes. mark for My Articles similar articles
T.H.E. Journal
August 2005
Irene Sandler
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. mark for My Articles similar articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
CIO
October 15, 2003
Eric Knorr
You Want Wi-Fi with That? Roadside wireless options abound -- even at McDonald's -- but can you let users take advantage and still keep your systems safe? mark for My Articles similar articles
Inc.
June 2007
Michael Fitzgerald
The Best Spam Fighters Six ways to protect your E-mail. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
CIO
November 1, 2003
Alice Dragoon
Be a Spam Slayer The ubiquitous awfulness of spam affords CIOs a rare opportunity to look good. Here's how CIOs can leap into the spam fray and keep e-mail viable and valuable for users. mark for My Articles similar articles
PC Magazine
September 11, 2009
Jamie Lendino
Kill Your Phone Remotely Many of today's most popular smartphones can be erased remotely if they are lost or stolen; here's how to do it. mark for My Articles similar articles
PC Magazine
December 12, 2007
Neil J. Rubenking
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. mark for My Articles similar articles
InternetNews
May 14, 2004
Ryan Naraine
Risk Management, The Microsoft Way How do you secure the 'world's largest experimental computer network'? Redmond shares its risk-management security strategy. mark for My Articles similar articles
IndustryWeek
November 1, 2005
Doug Bartholomew
Leaders Supporting Growth With IT Manufacturers that run a profitable operation generally tend to be savvy users of IT and have been careful to pull in the reins on technology spending wherever possible in recent years. mark for My Articles similar articles
PC World
July 29, 2002
Sam Costello
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. mark for My Articles similar articles
InternetNews
June 7, 2004
Robyn Greenspan
The Deadly Duo: Spam and Viruses, May 2004 The spam volume remains unchanged over the month, but Internet users don't have reason to celebrate, as the plateau is not indicative of an imminent decline in unwanted messages. mark for My Articles similar articles
PC Magazine
February 17, 2004
Cade Metz
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. mark for My Articles similar articles