Similar Articles |
|
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
PC Magazine February 1, 2006 Oliver Kaven |
Protect Your Business Small businesses have less to protect, but that doesn't mean less to lose: A single attack can cost them everything. |
PC Magazine February 2, 2005 Robert P. Lipschutz |
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
Entrepreneur April 2004 Bender, Clancy, & Kooser |
Secure Horizons Are worries about spam, viruses and hackers keeping you up at night? Our Internet security guide will help you protect the future of your business so you can sleep soundly. |
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
Bank Technology News August 2006 Michael Sisk |
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
PC Magazine February 1, 2008 Matthew D. Sarrel |
Unified Threat Management A single interface to protect your network makes good sense. |
CIO November 15, 2000 Sarah D. Scalet |
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? |
CIO January 15, 2007 Galen Gruman |
Mobile Mastery Treos, BlackBerrys and smart phones don't have to wreak havoc on enterprise IT. Here's how to keep users happy, data secure and costs in check. |
HBS Working Knowledge June 30, 2003 Austin & Darby |
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
PC Magazine August 3, 2004 |
Security Checklist Follow this computer security checklist to keep your business safe. |
InternetNews August 16, 2004 Jim Wagner |
Postini Beefs Up Perimeter Defenses The managed e-mail security firm adds features that free administrators of much of the hassle in dealing with spam while giving individual users more control over their settings. |
CIO June 29, 2011 |
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. |
T.H.E. Journal April 2004 Jim Myers |
Security Software Enriches Troy City Schools Educational Experience by Providing Safe E-Mail To address the requirement of schools to block and monitor all e-mail originating both internally and externally, anti-spam technology has emerged as a vital tool. |
PC Magazine December 22, 2004 Michael J. Miller |
The Agenda for 2005 This month marks the 30th anniversary of the modern personal computer... Fight spam... Improve security... Protect users' rights... Protect and expand Internet connections... Gadget of the Month: HP's Digital Entertainment Center... etc. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
PC Magazine January 26, 2005 Matthew D. Sarrel |
Lock Down Your E-Mail Businesses that live and die by e-mail have to get serious about keeping it safe. If you're concerned about viruses that can overload your servers, legal and regulatory liability for message content, and an ever-growing deluge of spam, read on. |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
IndustryWeek October 1, 2006 Doug Bartholomew |
Supply Chains at Risk Manufacturers need to guard against disruptions in the flow of materials. With so many things that can -- and do -- go wrong, contingency planning is no longer a luxury. It's a necessity. |
PC Magazine July 16, 2007 Neil J. Rubenking |
Yoggie Pico Personal We love the idea: enterprise-style security on a tiny, dedicated computer. The question is, does it work? |
InternetNews August 30, 2005 |
The Pain in the Endpoints A study by SupportSoft says mobile devices are a pain in the IT department's neck. |
PC World July 2005 Scott Dunn |
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... |
PC World June 2006 Andrew Brandt |
New Devices Promise Protection in a Box These security gateways claim to stop threats before they reach your network. Netgear WGT624SC Super G Wireless Router... the Spam Cube... TrustEli Eli Security Appliance... |
Bank Technology News September 2008 Tom Kellermann |
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. |
CFO October 1, 2004 Russ Banham |
The Enemy Within When it comes to combating worms, Trojan horses, and viruses, technology alone is not enough. Human error can undo almost any firewall or safeguard. Yet in some cases the fixes are remarkably simple. |
Inc. October 2005 John Fried |
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. |
PC Magazine November 11, 2003 Larry J. Seltzer |
Enterprise Spam Tools: Several Approaches, Including Some That Work Client-side spam utilities like Norton AntiSpam 2004 are fine for home users, but any business large enough to have a mail server needs something more: a server-side solution that traps spam before it hits employees' in-boxes. |
T.H.E. Journal August 2005 Irene Sandler |
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
CIO October 15, 2003 Eric Knorr |
You Want Wi-Fi with That? Roadside wireless options abound -- even at McDonald's -- but can you let users take advantage and still keep your systems safe? |
Inc. June 2007 Michael Fitzgerald |
The Best Spam Fighters Six ways to protect your E-mail. |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
CIO November 1, 2003 Alice Dragoon |
Be a Spam Slayer The ubiquitous awfulness of spam affords CIOs a rare opportunity to look good. Here's how CIOs can leap into the spam fray and keep e-mail viable and valuable for users. |
PC Magazine September 11, 2009 Jamie Lendino |
Kill Your Phone Remotely Many of today's most popular smartphones can be erased remotely if they are lost or stolen; here's how to do it. |
PC Magazine December 12, 2007 Neil J. Rubenking |
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. |
InternetNews May 14, 2004 Ryan Naraine |
Risk Management, The Microsoft Way How do you secure the 'world's largest experimental computer network'? Redmond shares its risk-management security strategy. |
IndustryWeek November 1, 2005 Doug Bartholomew |
Leaders Supporting Growth With IT Manufacturers that run a profitable operation generally tend to be savvy users of IT and have been careful to pull in the reins on technology spending wherever possible in recent years. |
PC World July 29, 2002 Sam Costello |
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. |
InternetNews June 7, 2004 Robyn Greenspan |
The Deadly Duo: Spam and Viruses, May 2004 The spam volume remains unchanged over the month, but Internet users don't have reason to celebrate, as the plateau is not indicative of an imminent decline in unwanted messages. |
PC Magazine February 17, 2004 Cade Metz |
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. |