INFORMATION

Site Map - IT

Behind the Numbers: A Surge in Phishing Attacks

-

Quick Bytes: Cyberwar Risk

- China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.

Numbers

- 85 The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.

Checking IT Backgrounds

- As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.

In Privacy We Trust

- A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Working in the Wild

- If a laptop is stolen, encryption software keeps data hidden, while tracking software "phones home," making it easy to catch the crooks.

Waive Goodbye to Liability

- Penetration testing of a computer network requires careful planning and limits on the scope of work.

Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

A Site to See

- Machine agents such as robots or crawlers (called bots) visit millions of Web sites daily. Sometimes the use is benign, as when search agents use them to update their information. But these programs can also be harmful. They can be used to hunt for Web site vulnerabilities or harvest e-mail addresses for future spamming. They can also reduce a Web site’s bandwidth. A new site keeps an updated list of bad bots and crawlers. Web site host managers and business owners can download data for free from Botslist.com that can then be configured to block bad robots. It’s this month’s A Site to See.

Search Engine Safety

- Which leading Web search engines are the safest and which are the most insecure? Find out in McAfee’s latest study, “The State of Search Engine Safety.”

Laptop Security

- Read about the staggering economic costs downtown Calgary experienced due to laptops stolen from tenant space.

IT Security

- What’s the number one threat to corporate security in 2007? While many believe it’s Web viruses, a new survey of European high level IT managers says it’s removable media devices.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.