INFORMATION

Site Map - Cybersecurity

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Waive Goodbye to Liability

- Penetration testing of a computer network requires careful planning and limits on the scope of work.

Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

Quick Bytes: ID Theft Rising

- About 15 million Americans fell victim to some form of identity theft in the 12 months ending in mid-2006, an increase of more than 50 percent since 2003. For the rest of the Garner survey, click here.

A Site to See

- Machine agents such as robots or crawlers (called bots) visit millions of Web sites daily. Sometimes the use is benign, as when search agents use them to update their information. But these programs can also be harmful. They can be used to hunt for Web site vulnerabilities or harvest e-mail addresses for future spamming. They can also reduce a Web site’s bandwidth. A new site keeps an updated list of bad bots and crawlers. Web site host managers and business owners can download data for free from Botslist.com that can then be configured to block bad robots. It’s this month’s A Site to See.

QUICK BYTES - Business PC Risk

- Thirteen percent of corporate PCs have had unauthorized USB devices attached to them, creating the risk for data loss and malware to enter the corporate system.

QUICK BYTES - Data Disaster?

- One-third of IT professionals believe that a major data breach could put their company out of business.

Numbers

- 54 Percentage of identity theft breaches stemming from the theft or loss of a computer or storage medium, such as a USB memorykey, according to a recent Symantec report.

A Site to See

- A one-stop site for testing your PC's speed and security.

Crooks Zero in on Vulnerable Data

- Growth in "zero-day" attacks.

Security and Outsourcing: Negotiate Early

- The need to focus on security during negotiations with outsource contractors.

A Site to See

- In order to ensure that your PC is protected from malware, it helps to run a few tests. Auditmypc.com offers just that: a handful of free, relatively quick self-assessments. Options include testing the strength of your firewall and your protection against pop-ups.

Drive-By-Downloads

- About ten percent of Web pages contain malicious code, according to a Google study.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.