MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
June 5, 2009
Alex Goldman
For Better Network Security, Know What You Have A security expert speaking at Cyber Infrastructure Protection '09 said that most data breaches occur in places on the network that are not monitored or secure. Managers who know their network can block most attacks. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
CFO
February 1, 2012
Russ Banham
Where the Money Is, and the Security Isn't Cyber thieves are increasingly targeting small and midsize businesses, and why not? Most SMBs do little to protect themselves. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Insurance & Technology
August 10, 2006
Anthony O'Donnell
The Road to Security Security is a journey - it is a constant and evolving discipline. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
December 16, 2008
Sean Michael Kerner
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
HBS Working Knowledge
June 30, 2003
Austin & Darby
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
July 25, 2005
Sean Michael Kerner
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Entrepreneur
February 2008
Amanda C. Kooser
Data Saver Your most valuable business asset may also be your most intangible one: data. Everything from customer credit card numbers to employee records to pricing information needs protection. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
InternetNews
April 10, 2007
Andy Patrizio
Three Critical Fixes For Windows Microsoft releases three significant fixes for Windows, but Office remains exposed. mark for My Articles similar articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
InternetNews
July 10, 2009
Alex Goldman
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
Inc.
August 2008
Michael Fitzgerald
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
CFO
March 1, 2009
Bob Violino
As the Economy Sinks, Data Breaches Rise Many companies still fail to address rudimentary security issues. Despite budget pressures, they can't afford to ignore them much longer. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
September 9, 2008
Sean Michael Kerner
Microsoft Updates for Media Vulnerabilities Be careful what you listen to on your PC. Hackers may want to get it. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2004
George V. Hulme
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. mark for My Articles similar articles
Bank Technology News
September 2008
Tom Kellermann
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. mark for My Articles similar articles
InternetNews
March 11, 2008
David Needle
Microsoft Targets Office Remote Execution Flaws Latest "Patch Tuesday" updates aim to shut the door on a slew of critical Office suite vulnerabilities. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
September 23, 2005
Sean Michael Kerner
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. mark for My Articles similar articles
InternetNews
January 17, 2007
Ed Sutherland
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. mark for My Articles similar articles
PC Magazine
June 21, 2006
Outsmarting Keyloggers How to protect passwords and personal information in public cybercafes. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles