INFORMATION

Site Map - IT

Quick Bytes: Security’s lingua franca

- Aligning IT with business goals was the number one challenge facing the majority of CIOs in the public and private sectors, according to a Government Accountability Office report. According to the report, “This challenge requires the CIOs to develop IT plans to support their companies’ business objectives. In many cases this entails cross-organizational coordination and collaboration,” echoing the results from the ASIS study on convergence (see “The Growing Trend Toward Convergence,” page 48). @ Chief Information Officers: Responsibilities and Information Technology Governance at Leading Private Sector Companies is at SM Online.

Go Phish

- There are seven steps in a phishing attack, from preparation through successful infection of a victim to the fraud committed using stolen information. Fortunately, there are countermeasures available for each stage. For example, organizations should monitor call volumes and the type of questions customers are asking; a large number of calls regarding password problems can signal a phishing attack. To interfere with the use of compromised information, organizations can use two-factor authentication devices such as biometrics. Instituting delays in some types of money transfers can provide time to detect and void phishing-based transactions.  @ Online identity theft: phishing technology, checkpoints and countermeasures, from the identity theft technology council,is at SM Online.

69

-

DHS Improves Its Infosec

-

New in Plain Text

-

A Look at Laptop Theft

-

The Road to Rational Decision-Making

- Most of us are lousy decision-makers, and unfortunately many of the decisions that we take as individuals or as a society can be both very wrong and have very harmful or costly consequences. But there are many tried and tested ways of making relatively sound decisions. Cost-benefit analysis, risk management, and related disciplines that rely on statistics, economics, the law, and psychology allow us to weigh choices rationally and increase the odds of making wise choices.

Arming the Road Warrior

- When employees travel on business, companies must ensure that their mobile computing does not put corporate data at risk.

The Price of Wireless Security

- A new survey finds companies will spend 10-20 percent more on security next year to protect their wireless networks and technology.

The Many Faces of Malware

- In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.

Behind the Numbers: A Surge in Phishing Attacks

-

Quick Bytes: Cyberwar Risk

- China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.

Numbers

- 85 The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.