Similar Articles |
|
Wall Street & Technology August 21, 2006 Anthony Guerra |
Outer Defenses To win back investors' confidence following a seemingly endless parade of high-profile breaches, remote hardware security has become a differentiating factor for financial services firms. |
CIO December 1, 2005 Thomas Wailgum |
Mastering Mobile Madness Wireless devices are multiplying, making more people more productive - and creating enormous management, support and security headaches for CIOs. You need a plan for juggling these new gadgets. Here's the plan. |
Bank Technology News August 2006 Michael Sisk |
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
PC World August 2004 Anne Kandra |
Keep Your Hands on Your Handhelds How to prevent laptops and other portable devices from being stolen or lost. |
Entrepreneur February 2008 Amanda C. Kooser |
Data Saver Your most valuable business asset may also be your most intangible one: data. Everything from customer credit card numbers to employee records to pricing information needs protection. |
T.H.E. Journal April 2005 Philip Lombardi |
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. |
PC World February 8, 2001 Cameron Crouch |
Tips for Keeping a Leash on Your PDA's Data Built-in and third-party security tools can help protect your PDA, even if you let it out of your hands... |
Entrepreneur August 2007 Amanda C. Kooser |
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. |
IndustryWeek March 1, 2006 Doug Bartholomew |
Responding To Risk: Invisible Enemies Manufacturers must find ways to prevent electronic threats to their networks and data. |
PC World December 20, 2006 Kirk Steers |
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. |
InternetNews January 17, 2007 Ed Sutherland |
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. |
InternetNews September 27, 2006 Ed Sutherland |
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. |
CIO October 15, 2002 John Edwards |
Wireless Wranglers Management software promises to harness wild mobile devices -- eventually. |
PC Magazine September 20, 2006 Russell Morgan |
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. |
InternetNews May 22, 2007 Sean Michael Kerner |
Alcatel-Lucent 'Guardian' Locks Up Your Data The Guardian is a Linux-based notebook PC card loaded with security software that checks against a remote server to validate that the notebook hasn't been reported lost or stolen. |
InternetNews December 14, 2006 Ed Sutherland |
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? |
Entrepreneur November 2003 Mark Henricks |
Oh, the Places You'll Go! With the latest and greatest in mobile toys, you'll be ahead of the other girls and boys. And wherever you are, you will succeed. |
CIO October 15, 2002 Christopher Lindquist |
Picture Perfect Securing PDAs remains a oft-overlooked chore for many IT departments. Now Pointsec Mobile Technologies thinks it has a tool to make administration easier. |
CIO January 15, 2007 Galen Gruman |
Mobile Mastery Treos, BlackBerrys and smart phones don't have to wreak havoc on enterprise IT. Here's how to keep users happy, data secure and costs in check. |
Inc. August 2008 Michael Fitzgerald |
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
Insurance & Technology March 10, 2010 Anthony O'Donnell |
Thrivent Notifies Members of Breach of Unsecured Personal Information Laptop stolen from Pennsylvania office contained personal information, including name, address, social security number and health information. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
Entrepreneur November 2002 Mark Henricks |
Keep it Moving Just because you're on the road and out of the office doesn't have to mean your productivity will suffer. |
Financial Planning May 1, 2005 Ed McCarthy |
Road Warriors Advisers who travel frequently count on the latest technology to keep them connected to clients. Wireless data security is an important but frequently overlooked issue. Digital cellular and BlackBerry transmissions are considered secure, but Wi-Fi and Bluetooth have several vulnerabilities. |
CIO June 29, 2011 |
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. |
Investment Advisor March 1, 2011 Lewis Schiff |
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. |
Insurance & Technology July 12, 2006 Peggy Bresnick Kendler |
Managing Mobility Insurers are deploying mobile/wireless devices and applications to improve productivity in areas such as sales/agent support and claims. But security issues create risks. |
Entrepreneur November 2004 Heather Clancy |
On the Road Again? Then don't forget to pack these tech essentials -- the latest and greatest mobile gadgets and Wi-Fi access providers that will keep you connected, and keep your business one step ahead. |
Fast Company November 2008 Arianne Cohen |
Lojack for Laptops Companies lose billions of dollars a year in hardware and data. Here's how the good guys try to get the stuff back. |
InternetNews March 7, 2006 Roy Mark |
Symantec Begins Wireless Security Initiative Symantec and the Internet Education Foundation launched a consumer wireless education effort Tuesday initially aimed at the country's 56 million wireless Internet users. The first phase of the campaign will focus on security issues. |
InternetNews June 2, 2006 Clint Boulton |
Hotels.com Warns Customers on Data Theft Hotel booking site Hotels.com has begun sending out letters to some 243,000 customers whose names and credit card numbers were on a laptop stolen from an employee of Ernst & Young, the accounting firm. |
IndustryWeek November 1, 2001 John Teresko |
More Than High-Tech Toys Manufacturers will benefit from PDAs if they can manage their use and proliferation... |
CIO March 15, 2001 Ben Worthen |
Time to Get Nervous Wireless technology lets users roam - but also opens the door to problems. Here's how to think about balancing the rewards with the risks. Get tips for safeguarding devices and wireless systems, understand how to assess risks involved with wireless technology, learn what questions to ask about your wireless applications. |
Entrepreneur March 2004 Amanda C. Kooser |
Tech Buzz 3/04 Voice control, protecting your laptop and more. |
CIO August 28, 2008 Stephanie Overby |
Is It Time For Employee-Provisioned Hardware Programs? Employee provisioning of laptops and PDAs is the next logical step in the consumerization of IT. But figuring out the right parameters can be tricky. |
CIO August 1, 2003 Galen Gruman |
Wireless: Just What the Doctor Ordered As medical records go electronic, hospital CIOs are finding that wireless networks can get the records to where the doctors and nurses want to use them. CIOs in other industries would do well to watch and learn. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
Entrepreneur June 2004 Amanda C. Kooser |
Power to Go Get the benefits of a laptop in your handheld with Good Technology's GoodLink 3.0 messaging software. |
InternetNews April 5, 2007 Roy Mark |
IRS Audits Self Into Data-Theft Hot Seat New audit finds IRS with 500 missing or stolen laptops, some with unencrypted taxpayer confidential information. |
New Architect September 2002 Lincoln D. Stein |
Wireless, Defenseless Protect your wireless network before someone takes advantage |
InternetNews August 5, 2010 |
Another Laptop Theft Exposes 21K Patients' Data Philadelphia's Thomas Jefferson University Hospital is in the process of notifying more than 21,000 patients that a stolen laptop has exposed some of their most sensitive personal information. |
CIO July 16, 2008 Meridith Levinson |
Everyone Works at Home at Chorus, Part Two In this story, the second of three parts, a small software company establishes work-at-home policies and figures out how to provide remote tech support. Part one focused on the IT infrastructure needed to support telecommuters. |
CIO January 1, 2003 Meridith Levinson |
You've Got the Whole Enterprise in Your Handheld CIOs have spent billions Web-enabling enterprise systems in order to facilitate and reap the benefits of B2B e-commerce. Maybe all those handheld computers will help them recoup those investments. |
CIO July 1, 2001 |
Making Wireless Work SeraNova's Nagaraja Srivatsan advises readers on how companies can integrate smart phones, PDAs and pagers into the enterprise... |
T.H.E. Journal August 2001 Joyce Lambert |
New Aspects of Test Security Have you ever considered the new ways in which your tests are vulnerable to unauthorized access if you store your test files on an office or home computer? |
InternetNews April 23, 2010 |
Laptop Theft Exposes Data on 3,500 Patients Some people don't seem to learn. The latest lost laptop comes to you courtesy of a Massachusetts-based neurosurgeon whose unencrypted laptop was stolen, putting more than 3,500 patients' most sensitive data at risk. |
InternetNews September 22, 2006 Roy Mark |
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. |
PC World December 7, 2007 Becky Waring |
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. |