INFORMATION

Site Map - Cybersecurity

The Many Faces of Malware

- In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.

Behind the Numbers: A Surge in Phishing Attacks

-

Quick Bytes: Cyberwar Risk

- China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.

Numbers

- 85 The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.

Checking IT Backgrounds

- As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.

In Privacy We Trust

- A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Waive Goodbye to Liability

- Penetration testing of a computer network requires careful planning and limits on the scope of work.

Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

Quick Bytes: ID Theft Rising

- About 15 million Americans fell victim to some form of identity theft in the 12 months ending in mid-2006, an increase of more than 50 percent since 2003. For the rest of the Garner survey, click here.

A Site to See

- Machine agents such as robots or crawlers (called bots) visit millions of Web sites daily. Sometimes the use is benign, as when search agents use them to update their information. But these programs can also be harmful. They can be used to hunt for Web site vulnerabilities or harvest e-mail addresses for future spamming. They can also reduce a Web site’s bandwidth. A new site keeps an updated list of bad bots and crawlers. Web site host managers and business owners can download data for free from Botslist.com that can then be configured to block bad robots. It’s this month’s A Site to See.

QUICK BYTES - Business PC Risk

- Thirteen percent of corporate PCs have had unauthorized USB devices attached to them, creating the risk for data loss and malware to enter the corporate system.

QUICK BYTES - Data Disaster?

- One-third of IT professionals believe that a major data breach could put their company out of business.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.