Similar Articles |
|
T.H.E. Journal February 2007 John K. Waters |
Data Security :: Locked Down, Not Out A swarm of portable technologies is creating security headaches for school districts, as they must wrestle with opposing needs: how to protect the network from unauthorized use while still keeping it accessible to staff and students. |
T.H.E. Journal October 2007 Matt Villano |
School Security Strategy--Simplified Safety is a top priority for schools, and the best way to manage the risk is to address the top IT security issues for 2007-2008, and anticipate concerns on the horizon. |
T.H.E. Journal October 2008 Andy McDonough |
More Is More No one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. |
T.H.E. Journal November 2005 Williams & Krueger |
Is Your Network Safe? Why educators should care about cybersecurity - and what they should do about it. |
Entrepreneur June 2007 Amanda C. Kooser |
Safety First Keep your customer and employee data on lock-down. |
Bank Systems & Technology July 12, 2007 Larry Greenemeier |
Link Between Data Breaches And ID Theft Unclear, GAO Reports A U.S. Government Accountability Office report indicates that while the amount of information lost or stolen is disturbing, it's difficult to prove that these breaches lead to identity theft. |
T.H.E. Journal September 2003 Sylvia Charp |
Security and Privacy of Information We must all be fully aware of what is happening to information, which we previously thought was private and secure. Perhaps, we need more education as to what we should and should not do. |
CIO October 15, 2003 Ben Worthen |
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. |
InternetNews May 20, 2010 |
Novell Offers Cloud-Based Identity Manager With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way. |
InternetNews January 17, 2007 Ed Sutherland |
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. |
InternetNews January 12, 2009 Richard Adhikari |
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. |
InternetNews July 21, 2004 Clint Boulton |
Securing Identity a Novell, Oracle Affair Vendors use the Burton Group Catalyst Conference as a platform to launch identity management plans. |
T.H.E. Journal June 2006 Doug Gale |
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. |
InternetNews December 14, 2006 Ed Sutherland |
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? |
PC Magazine May 1, 2009 Matthew D. Sarrel |
Identity Theft: It's Out of Your Hands The most important thing you have is you, right? And online, you are your identity. If xyz.com doesn't value you enough to keep you safe, then does that company really deserve your business? |
Bank Systems & Technology November 6, 2008 Orla O'Sullivan |
2008 Data Breaches: 30 Million and Counting Roughly 30 million consumers have had sensitive personal data stolen in the 552 reported data breaches so far in 2008. |
T.H.E. Journal February 2008 Matt Bolch |
Remote Control School districts are catching on to software as a service, a business model that allows administrators to manage essential organizational functions and plug in to student data from anywhere with an internet connection. |
InternetNews October 20, 2010 |
McAfee Names Top 10 Social Security Number Traps At the kickoff of National Protect Your Identity Week, software security vendor McAfee advises users to exercise caution when sharing their Social Security numbers with colleges, government agencies and other groups. |
T.H.E. Journal June 2004 David L. Benson |
AAL Helps Blue Valley Stay on the Cutting Edge With a Customized Student Information System The partnership enhances the school district's SIS and brings added value to every student's home in the district. |
InternetNews August 3, 2010 |
Health Care Orgs Endure Data Breach Epidemic Hospitals, medical centers and physicians' offices have been responsible for a disproportionately large number of data breaches so far this year, according to one security study. |
T.H.E. Journal May 2006 Matt Miller |
Staying Connected Is a 'Breeze' An ed-tech specialist explains how a versatile Web conferencing tool is helping his sprawling district remove the distance between teachers, administrators, and staff. |
T.H.E. Journal October 2008 Rama Ramaswami |
A Tight Squeeze As government regulations mandate the long-term retention of districts' rising volume of information, K-12 IT directors are using new storage tools to put their data in its place. |
T.H.E. Journal September 2005 Robert Yost |
Flexible Network Infrastructure Helps Meet District's Changing Needs IP telephony system improves student safety and staff productivity of northern Virginia district. |
T.H.E. Journal August 2002 |
Christian County Touts Student-Run IT Help Desk The technology help desk at Christian County Public Schools in Kentucky is run by top-notch, fully trained information technology support professionals. And the best part is they're only high school students. |
PC Magazine June 21, 2006 Robert Lemos |
Defending Your Identity Hardly a week goes by without companies and universities losing digital identities. What can be done? |
Financial Advisor November 2005 Joel Bruckenstein |
Securing Yourself And Clients Identity theft poses a serious threat for financial advisors and their clients. Here are steps to take to prevent identity theft and related security concerns. |
CRM June 1, 2005 Marshall Lager |
Fear and Loathing in the Database A company's CRM system might make it vulnerable to hackers, but with risk comes opportunity. |
CIO January 1, 2003 Alison Bass |
Identity Crisis If identity theft isn't already on your radar screen, this headline will put it there: 13,000 Credit Reports Stolen by Hackers. To avoid a similar disaster on their turf, CIOs should insist their company's customer data be kept in separate databases protected by a number of different security measures. |
T.H.E. Journal December 2006 Linda L. Briggs |
Hand It Over! Districts are turning to the latest in mobile technology to crack down on age-old campus crime problems such as graffiti and theft. |
T.H.E. Journal December 2001 |
Troy School District's Integration of Media Curriculum Michigan's Troy School District recently completed the enormous task of implementing voice, video and data communications in each of its 19 school buildings and within every classroom in the district... |
T.H.E. Journal November 2001 Philip J. Bossert |
Lessons Learned An inside look at four of the top technology school districts in the nation... |
T.H.E. Journal January 2003 Jeff Jennings |
IT in a Time of Budget Cuts How school funding will affect the quality of education |
InternetNews February 12, 2010 |
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. |
T.H.E. Journal December 2006 Linda L. Briggs |
Document Management :: It Prints! It Faxes! It Scans! A state-of-the-art multifunction publishing system combines the work of several devices into a single unit, creating dramatic savings in paper use and personnel time. |
T.H.E. Journal November 2002 |
Technology Takes On Rural Alaskan Schools Technology is improving virtually all aspects of rural education for teachers, administrators and students. Nowhere is this demonstrated better than in the Northwest Arctic Borough School District, located in one of the most remote areas of northwest Alaska. |
T.H.E. Journal September 2002 Barnum & Paarmann |
Bringing Induction to the Teacher: A Blended Learning Model The immense scope of trying to cram the culture, processes and procedures of a school into a few days' time, while new teachers are also preparing for the imminent arrival of their students, is often overwhelming. But a blending of varied technologies can ease the burden. |
Bank Systems & Technology August 30, 2004 Ivan Schneider |
Who Was That Masked Man? MSU professor talks about the problem of fighting ID theft and the Identity Theft Penalty Enhancement Act. |
T.H.E. Journal February 2007 John K.Waters |
Classroom Collaborators Wireless connectivity is providing a level of flexibility for students and teachers, changing the learning environment in ways that in some cases has to be seen to be believed. |
T.H.E. Journal May 2006 Nodine & Petrides |
ISKME Special Series Part 4: Using Data to Improve Instruction Connecting the dots: how to use data to get from districtwide goal-setting to school-level performance. |
PC Magazine August 22, 2008 Matthew D. Sarrel |
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. |
T.H.E. Journal February 1, 2010 Vanessa Hua |
Scare Tactics In April, as public fears about a mysterious new strain of flu grew, the Los Angeles Unified School District moved to forestall a panic. Many districts are using technology solutions to respond to emergencies such as this. |
Wall Street & Technology October 20, 2006 Tim Clark |
Password and Identity Management Strategies Begin to Take Shape As financial services firms come to grips with the vulnerability of their IT systems, best practices around password and identity management becomes a paramount concern. |
CIO December 1, 2002 Meridith Levinson |
Who Goes There? Identity management tools can help CIOs gain control of who gets access to what and when. |
InternetNews July 15, 2004 Roy Mark |
Identity Theft Law Hits Back at 'Phishers' The Identity Theft Penalty Enhancement Act, signed into law by President Bush, mandates federal prison terms for using a false identity in the commission of a felony. |
Entrepreneur September 2008 Mark Henricks |
On The Defensive Lock up employee data, or face the consequences. |
Inc. August 2003 Robert X. Cringely |
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. |
T.H.E. Journal January 2001 |
Setting Standards in Schools SchoolNet, an ASP offering Internet solutions for performance-driven schools, districts and states, is supplying tools to meet education leaders' need to utilize their abundance of data... |
T.H.E. Journal November 2006 Neal Starkman |
Special Section: Resource Management :: Value Judgments Are your technology expenditures proving to be money well spent? A new online total cost of ownership (TCO) tool will let you know. |
InternetNews January 7, 2011 |
ITRC Seeks Full Data Breach Disclosure With major data breaches on the rise, the Identity Theft Resource Center is urging the formation of a centralized, searchable repository for the public to keep track of what institutions have seen their information compromised. |
InternetNews March 2, 2009 Richard Adhikari |
ID Theft Threat Grows With 1M Already Hit in '09 A new report shows identify theft is off to a rapid start this year - and the figures could be even worse than expected. |