INFORMATION

Site Map - Cybersecurity

EU Balks at Employee Monitoring

- Companies that operate internationally must be aware of the stringent workplace privacy laws in the EU countries.

Behind the Numbers: Access Controls Used for High-Security Areas

- Access controls used for high-security areas.

A Site to See: TOSBack

- This Site to See notifies its subscribers when companies change their terms of service.

Cyber Stats High?

- Estimates on the size of the underground cybercrime economy may be inflated, according to a recent Microsoft report.

Quick Bytes: Mobile Risks

- Many employees are unaware of network security policies or intentionally try to evade them, according to a recent Ponemon Institute study.

Social Engineering Risks

- Cybercriminals' new tactic to steal valuable information preys on human nature.

Do Virtual Server Risks Outweigh Rewards?

- Many business managers fear that virtual servers are too vulnerable to attack, but technology is improving.

Data Security Through Deletion

- Instead of focusing on protection methods, one organization set out to limit the amount of sensitive data it collected.

Malware Attacks

- Malware attacks grew at a record pace in 2008 and are increasingly designed to steal personal information, such as passwords, according to the most recent Symantec Internet Security Threat Report. Most new infections stem from Web surfing.

Site to See: VIPRE Rescue Program

- Sometimes malware can render computers nearly or completely unoperational. It can shut down Windows system tools and security software. This free utility can be placed on a flash drive and used to rescue a crippled machine.

Behind the Numbers

- What data would IT employees steal if fired?

Site to See: VIPRE Rescue Program

- Sometimes malware can render computers nearly or completely inoperable. A VIPRE Rescue Program scan can remove rootkits and other malware and log removal events.

Personal Data Threatened

- Malicious code activity continued to grow at a record pace in 2008, primarily targeting computer users’ personal information, according to a new Symantec report.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.