INFORMATION

Site Map - Cybersecurity

Quick Bytes: Risky e-mail

- he survey, which received responses from 1,042 workers in the U.S., was conducted by Harris Interactive for managed e-mail archiving company Fortiva

Worth a Look: A Web Camera for Surveillance

- Now, setting up a surveillance network—including motion-activation sensors—is as simple as plugging a Web camera into a computer’s USB port.

Web Sites Provide Rich Harvest for Spammers

-

The Betamax Dilemma

-

Behind the Numbers

-

Quick Bytes: Weak Passwords

- Do you use the same password for all the different sites you visit that require one? If you do, you’re in the majority, according to a poll of 100 people conducted by UPEK, a manufacturer of biometric products. Half of those who use the same password say that it is based on the name of their spouse, pet, hometown, or favorite baseball team—and it is never changed.  @ More from the UPEK survey, which also considers the public’s acceptance of using biometrics instead of passwords, is at SM Online.

Quick Bytes: Antifraud Measures

- Credit card fraudsters are costing the economy billions of dollars each year. Merchants can minimize those losses by taking preventive measures, such as comparing IP addresses to ascertain the distance between the person ordering the goods and the billing address of the online buyer, noting whether a free e-mail address was used, and checking for the use of anonymous proxy servers. A paper from FraudLabs, which offers antifraud services for online merchants, outlines more measures.  @ 10 Measures to Reduce Credit Card Fraud for Internet Merchants is at SM Online.

Quick Bytes: Security’s lingua franca

- Aligning IT with business goals was the number one challenge facing the majority of CIOs in the public and private sectors, according to a Government Accountability Office report. According to the report, “This challenge requires the CIOs to develop IT plans to support their companies’ business objectives. In many cases this entails cross-organizational coordination and collaboration,” echoing the results from the ASIS study on convergence (see “The Growing Trend Toward Convergence,” page 48). @ Chief Information Officers: Responsibilities and Information Technology Governance at Leading Private Sector Companies is at SM Online.

Go Phish

- There are seven steps in a phishing attack, from preparation through successful infection of a victim to the fraud committed using stolen information. Fortunately, there are countermeasures available for each stage. For example, organizations should monitor call volumes and the type of questions customers are asking; a large number of calls regarding password problems can signal a phishing attack. To interfere with the use of compromised information, organizations can use two-factor authentication devices such as biometrics. Instituting delays in some types of money transfers can provide time to detect and void phishing-based transactions.  @ Online identity theft: phishing technology, checkpoints and countermeasures, from the identity theft technology council,is at SM Online.

69

-

DHS Improves Its Infosec

-

New in Plain Text

-
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.