MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Wall Street & Technology
August 21, 2006
Anthony Guerra
Outer Defenses To win back investors' confidence following a seemingly endless parade of high-profile breaches, remote hardware security has become a differentiating factor for financial services firms. mark for My Articles similar articles
CIO
December 1, 2005
Thomas Wailgum
Mastering Mobile Madness Wireless devices are multiplying, making more people more productive - and creating enormous management, support and security headaches for CIOs. You need a plan for juggling these new gadgets. Here's the plan. mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
PC World
August 2004
Anne Kandra
Keep Your Hands on Your Handhelds How to prevent laptops and other portable devices from being stolen or lost. mark for My Articles similar articles
Entrepreneur
February 2008
Amanda C. Kooser
Data Saver Your most valuable business asset may also be your most intangible one: data. Everything from customer credit card numbers to employee records to pricing information needs protection. mark for My Articles similar articles
T.H.E. Journal
April 2005
Philip Lombardi
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. mark for My Articles similar articles
PC World
February 8, 2001
Cameron Crouch
Tips for Keeping a Leash on Your PDA's Data Built-in and third-party security tools can help protect your PDA, even if you let it out of your hands... mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
IndustryWeek
March 1, 2006
Doug Bartholomew
Responding To Risk: Invisible Enemies Manufacturers must find ways to prevent electronic threats to their networks and data. mark for My Articles similar articles
PC World
December 20, 2006
Kirk Steers
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. mark for My Articles similar articles
InternetNews
January 17, 2007
Ed Sutherland
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. mark for My Articles similar articles
InternetNews
September 27, 2006
Ed Sutherland
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. mark for My Articles similar articles
CIO
October 15, 2002
John Edwards
Wireless Wranglers Management software promises to harness wild mobile devices -- eventually. mark for My Articles similar articles
PC Magazine
September 20, 2006
Russell Morgan
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. mark for My Articles similar articles
InternetNews
May 22, 2007
Sean Michael Kerner
Alcatel-Lucent 'Guardian' Locks Up Your Data The Guardian is a Linux-based notebook PC card loaded with security software that checks against a remote server to validate that the notebook hasn't been reported lost or stolen. mark for My Articles similar articles
InternetNews
December 14, 2006
Ed Sutherland
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? mark for My Articles similar articles
Entrepreneur
November 2003
Mark Henricks
Oh, the Places You'll Go! With the latest and greatest in mobile toys, you'll be ahead of the other girls and boys. And wherever you are, you will succeed. mark for My Articles similar articles
CIO
October 15, 2002
Christopher Lindquist
Picture Perfect Securing PDAs remains a oft-overlooked chore for many IT departments. Now Pointsec Mobile Technologies thinks it has a tool to make administration easier. mark for My Articles similar articles
CIO
January 15, 2007
Galen Gruman
Mobile Mastery Treos, BlackBerrys and smart phones don't have to wreak havoc on enterprise IT. Here's how to keep users happy, data secure and costs in check. mark for My Articles similar articles
Inc.
August 2008
Michael Fitzgerald
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Insurance & Technology
March 10, 2010
Anthony O'Donnell
Thrivent Notifies Members of Breach of Unsecured Personal Information Laptop stolen from Pennsylvania office contained personal information, including name, address, social security number and health information. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
Entrepreneur
November 2002
Mark Henricks
Keep it Moving Just because you're on the road and out of the office doesn't have to mean your productivity will suffer. mark for My Articles similar articles
Financial Planning
May 1, 2005
Ed McCarthy
Road Warriors Advisers who travel frequently count on the latest technology to keep them connected to clients. Wireless data security is an important but frequently overlooked issue. Digital cellular and BlackBerry transmissions are considered secure, but Wi-Fi and Bluetooth have several vulnerabilities. mark for My Articles similar articles
CIO
June 29, 2011
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. mark for My Articles similar articles
Investment Advisor
March 1, 2011
Lewis Schiff
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. mark for My Articles similar articles
Insurance & Technology
July 12, 2006
Peggy Bresnick Kendler
Managing Mobility Insurers are deploying mobile/wireless devices and applications to improve productivity in areas such as sales/agent support and claims. But security issues create risks. mark for My Articles similar articles
Entrepreneur
November 2004
Heather Clancy
On the Road Again? Then don't forget to pack these tech essentials -- the latest and greatest mobile gadgets and Wi-Fi access providers that will keep you connected, and keep your business one step ahead. mark for My Articles similar articles
Fast Company
November 2008
Arianne Cohen
Lojack for Laptops Companies lose billions of dollars a year in hardware and data. Here's how the good guys try to get the stuff back. mark for My Articles similar articles
InternetNews
March 7, 2006
Roy Mark
Symantec Begins Wireless Security Initiative Symantec and the Internet Education Foundation launched a consumer wireless education effort Tuesday initially aimed at the country's 56 million wireless Internet users. The first phase of the campaign will focus on security issues. mark for My Articles similar articles
InternetNews
June 2, 2006
Clint Boulton
Hotels.com Warns Customers on Data Theft Hotel booking site Hotels.com has begun sending out letters to some 243,000 customers whose names and credit card numbers were on a laptop stolen from an employee of Ernst & Young, the accounting firm. mark for My Articles similar articles
IndustryWeek
November 1, 2001
John Teresko
More Than High-Tech Toys Manufacturers will benefit from PDAs if they can manage their use and proliferation... mark for My Articles similar articles
CIO
March 15, 2001
Ben Worthen
Time to Get Nervous Wireless technology lets users roam - but also opens the door to problems. Here's how to think about balancing the rewards with the risks. Get tips for safeguarding devices and wireless systems, understand how to assess risks involved with wireless technology, learn what questions to ask about your wireless applications. mark for My Articles similar articles
Entrepreneur
March 2004
Amanda C. Kooser
Tech Buzz 3/04 Voice control, protecting your laptop and more. mark for My Articles similar articles
CIO
August 28, 2008
Stephanie Overby
Is It Time For Employee-Provisioned Hardware Programs? Employee provisioning of laptops and PDAs is the next logical step in the consumerization of IT. But figuring out the right parameters can be tricky. mark for My Articles similar articles
CIO
August 1, 2003
Galen Gruman
Wireless: Just What the Doctor Ordered As medical records go electronic, hospital CIOs are finding that wireless networks can get the records to where the doctors and nurses want to use them. CIOs in other industries would do well to watch and learn. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Entrepreneur
June 2004
Amanda C. Kooser
Power to Go Get the benefits of a laptop in your handheld with Good Technology's GoodLink 3.0 messaging software. mark for My Articles similar articles
InternetNews
April 5, 2007
Roy Mark
IRS Audits Self Into Data-Theft Hot Seat New audit finds IRS with 500 missing or stolen laptops, some with unencrypted taxpayer confidential information. mark for My Articles similar articles
New Architect
September 2002
Lincoln D. Stein
Wireless, Defenseless Protect your wireless network before someone takes advantage mark for My Articles similar articles
InternetNews
August 5, 2010
Another Laptop Theft Exposes 21K Patients' Data Philadelphia's Thomas Jefferson University Hospital is in the process of notifying more than 21,000 patients that a stolen laptop has exposed some of their most sensitive personal information. mark for My Articles similar articles
CIO
July 16, 2008
Meridith Levinson
Everyone Works at Home at Chorus, Part Two In this story, the second of three parts, a small software company establishes work-at-home policies and figures out how to provide remote tech support. Part one focused on the IT infrastructure needed to support telecommuters. mark for My Articles similar articles
CIO
January 1, 2003
Meridith Levinson
You've Got the Whole Enterprise in Your Handheld CIOs have spent billions Web-enabling enterprise systems in order to facilitate and reap the benefits of B2B e-commerce. Maybe all those handheld computers will help them recoup those investments. mark for My Articles similar articles
CIO
July 1, 2001
Making Wireless Work SeraNova's Nagaraja Srivatsan advises readers on how companies can integrate smart phones, PDAs and pagers into the enterprise... mark for My Articles similar articles
T.H.E. Journal
August 2001
Joyce Lambert
New Aspects of Test Security Have you ever considered the new ways in which your tests are vulnerable to unauthorized access if you store your test files on an office or home computer? mark for My Articles similar articles
InternetNews
April 23, 2010
Laptop Theft Exposes Data on 3,500 Patients Some people don't seem to learn. The latest lost laptop comes to you courtesy of a Massachusetts-based neurosurgeon whose unencrypted laptop was stolen, putting more than 3,500 patients' most sensitive data at risk. mark for My Articles similar articles
InternetNews
September 22, 2006
Roy Mark
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles