MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
Global Services
June 1, 2008
Imrana Khan
Five Most Popular Outsourcing Risks As the practice of outsourcing matures, new risks emerge. Some call it next generation outsourcing risks. Let's take a look at the topic of managing risks in an outsourcing engagement. mark for My Articles similar articles
Insurance & Technology
November 1, 2006
Maria Woehr
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. mark for My Articles similar articles
Insurance & Technology
March 16, 2004
Peggy Bresnick-Kendle
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
OCC Bulletin
November 1, 2001
Third-Party Relationships This bulletin provides guidance to national banks on managing the risks that may arise from their business relationships with third parties... mark for My Articles similar articles
Insurance & Technology
September 14, 2004
Peggy Bresnick Kendler
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. mark for My Articles similar articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
CIO
October 15, 2008
Kim S. Nash
Why Technology Isn't The Answer To Better Security You've beefed up your IT security arsenal, and you're focused on compliance. But you're still vulnerable. Here's why. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Wall Street & Technology
April 27, 2004
Ivy Schmerken
Offshore Outsourcing: Is Your Data Safe? Financial-services firms are taking extra security measures at their offshore outsourcing facilities. Are security-related fears valid, or are they hype? mark for My Articles similar articles
Bank Systems & Technology
June 1, 2005
Deena M. Amato-McCoy
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
Bank Technology News
September 2008
Tom Kellermann
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. mark for My Articles similar articles
Entrepreneur
September 2008
Mark Henricks
On The Defensive Lock up employee data, or face the consequences. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
HBS Working Knowledge
June 30, 2003
Austin & Darby
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. mark for My Articles similar articles
CFO
August 1, 2005
Kris Frieswick
Background Checks Worries about personnel integrity are creating a few worries of their own. Apart from the philosophical question of whether the practice violates an applicant's right to privacy, widespread use of elaborate background checks poses several problems for employers. mark for My Articles similar articles
Entrepreneur
December 2006
Chris Penttila
Just Checking Should you conduct ongoing background checks on your employees? mark for My Articles similar articles
Bank Technology News
September 2009
Mike Scheuerman
Outsource the Small Stuff Small financial institutions typically struggle with their IT infrastructure. Often, the answer is outsourcing. mark for My Articles similar articles
Bank Systems & Technology
May 7, 2007
Peggy Bresnick Kendler
Bank Tech Experts Discuss Vendor Relationships Here, these industry experts talk about outsourcing and offshoring along with other areas of bank tech concerns. mark for My Articles similar articles
CIO
June 1, 2002
Sarah D. Scalet
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks mark for My Articles similar articles
PC Magazine
February 3, 2004
Leon Erlanger
IM and P2P Security The explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network--and your company--safe. mark for My Articles similar articles
CFO
August 1, 2002
Scott Leibs
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. mark for My Articles similar articles
IndustryWeek
August 1, 2005
John Teresko
Protecting Intellectual Capital Strategic initiatives such as nanotechnology heighten the need for intellectual property safeguards. Here is a list of steps you can take to protect your company. mark for My Articles similar articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles
InternetNews
January 17, 2007
Ed Sutherland
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. mark for My Articles similar articles
Entrepreneur
May 2007
Chris Penttila
Play It Safe Protect your business information when you subcontract. mark for My Articles similar articles
Bank Systems & Technology
August 30, 2005
Maria Bruno-Britz
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. mark for My Articles similar articles
Global Services
May 28, 2008
The U.S. Presidential Race: Impact on Global Services-II Legal expert William B. Bierce predicts the expected changes in foreign direct investment, legal framework for global services, free trade agreements, and the overall implications for enterprise customers and service providers, after the November U.S. Presidential elections. mark for My Articles similar articles
Insurance & Technology
November 17, 2004
Wendy Toth
A Human Approach A recent study found that more than 70 percent of respondents failed to list training and raising employee awareness of information security as a top initiative. Yet communication among management may be the best security asset. mark for My Articles similar articles
CIO
March 9, 2012
Stephanie Overby
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Wendy Toth
Best Line Of Defense While insurance companies must secure their systems against ever-more-sophisticated attacks, they also must provide safe access to these systems for customers and business partners. mark for My Articles similar articles
CFO
April 1, 2008
Scott Leibs
Firewall of Silence Data security breaches are rampant, and costly. So why don't C-level executives talk about them? mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
Insurance & Technology
January 5, 2007
Larry Greenemeier
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. mark for My Articles similar articles
T.H.E. Journal
March 1, 2010
Charlene O'Hanlon
Identity Scramble An identity management system can catch potential mistakes that could put your district at risk. mark for My Articles similar articles
CIO
September 24, 2009
Matt Karlyn et al.
Identity Theft: 7 Tips for Complying with FTC Red Flag Rules The FTC's Red Flag Rules for reducing fraud due to identity theft take effect on November 1. Here's what you need to do to make sure you comply. mark for My Articles similar articles
HRO Today
Mar/Apr 2008
Kerry Ann Vales
Compliance Outsourcing Gaining New Ground in HRO Contracts In a world of changing regulations, employers are increasingly looking to service providers to help ensure they meet all applicable mandates. Expect more contracts, especially mid-market ones, to tack on compliance as part of the service delivery. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2006
Peggy Bresnick Kendler
Outsourcing Questions and answers about bank outsourcing. mark for My Articles similar articles
PC Magazine
August 22, 2008
Matthew D. Sarrel
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. mark for My Articles similar articles
U.S. Banker
December 2006
Karen Krebsbach
Inside the Outsourcing World of India India's outsourcers are offering ever-more specialized services, giving banks added reasons to say "yes" to outsourcing. mark for My Articles similar articles
IndustryWeek
April 1, 2002
Patrick Hernan
Looking For Trouble Employees' backgrounds face closer scrutiny in the wake of Sept. 11... mark for My Articles similar articles
Wall Street & Technology
November 26, 2007
Melanie Rodier
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. mark for My Articles similar articles