INFORMATION

Site Map - Cybersecurity

New in Plaintext

- True to the title, this book is easy to understand, and the projects are easy to follow. They range from customizing the desktop panel with shortcuts to installing and running new applications. There’s even a chapter on learning to use the dreaded Terminal.

Quick Bytes: Remote problem

- Should a disaster such as a flu pandemic hit the United States, many companies will deploy their work forces remotely so that business can continue without jeopardizing the health and welfare of workers

Security Goes to School

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Discovery Rules of the Digital Age

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Security Goes to School

- A third of higher-education institutions has experienced a data loss or theft—in particular grades and exam questions—in the last year, with nine percent reporting a loss or theft of student personal information, which could affect millions of university students.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops.  

A Site to See

- If you’re interested to know just how much information about your organization is out there on the Web, you might want to start by taking a look at the history of the company’s Web site. You may not realize it, but most Web pages have been saved on the Internet Archive Wayback Machine (which has archived 55 billion pages since 1996), divided by year and month, and in some cases by the day.

New in Plaintext

- Browse the bookstore for a beginner’s text on computers and it’s easy to come away feeling digitally inadequate. Titles that refer to the reader as a “dummy” or worse seem to be the only ones that, with wit and easy-to-understand language, can make technology accessible to the average reader.

Quick Bytes: Educating home users

- It’s commonplace for workers to use home computers to connect to corporate networks, but it’s no secret that these computers are an easy target for attackers, thus jeopardizing corporate networks as well. Stepping in to help is the National Institute of Standards and Technology (NIST), which has released a series of recommendations aimed at users of Windows XP Home Edition.

Quick Bytes: Text on Net annoyances

- Need to know everything there is to know about Web-based dangers and annoyances? Looking for a one-stop shop for the tips and tools that will prevent spam from hitting your computer or spyware from taking it over? Point your browser to a free online text by Dan Sullivan called The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.

Quick Bytes: The chemistry of security

- The American Chemistry Council’s Chemical Information Technology Council has released a guidance document “to educate and inform member companies, customers and the public” about cybersecurity concerns.

Security Convergence Roadmap Released

- The Open Security Exchange (OSE), a nonprofit association working with multiple industries to facilitate the convergence of physical and IT security, has created a roadmap that will help companies achieve the convergence of these functions; it is scheduled to be revealed this month.

Making Data Breaches Public

- When sensitive consumer information is stolen, the risk of identity theft rises. Many states have notification legislation; but, writes Michael Turner of the Information Policy Institute, federal rules are needed to prevent “patchwork responses.”
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.