INFORMATION

Site Map - IT

Checking IT Backgrounds

- As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.

In Privacy We Trust

- A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Working in the Wild

- If a laptop is stolen, encryption software keeps data hidden, while tracking software "phones home," making it easy to catch the crooks.

Waive Goodbye to Liability

- Penetration testing of a computer network requires careful planning and limits on the scope of work.

Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

A Site to See

- Machine agents such as robots or crawlers (called bots) visit millions of Web sites daily. Sometimes the use is benign, as when search agents use them to update their information. But these programs can also be harmful. They can be used to hunt for Web site vulnerabilities or harvest e-mail addresses for future spamming. They can also reduce a Web site’s bandwidth. A new site keeps an updated list of bad bots and crawlers. Web site host managers and business owners can download data for free from Botslist.com that can then be configured to block bad robots. It’s this month’s A Site to See.

Search Engine Safety

- Which leading Web search engines are the safest and which are the most insecure? Find out in McAfee’s latest study, “The State of Search Engine Safety.”

Laptop Security

- Read about the staggering economic costs downtown Calgary experienced due to laptops stolen from tenant space.

IT Security

- What’s the number one threat to corporate security in 2007? While many believe it’s Web viruses, a new survey of European high level IT managers says it’s removable media devices.

IT Security

- The three biggest data security concerns for businesses: outside data harvesting attacks, exposing sensitive information to unauthorized users, and accidental loss of employee data. Read more about the report here.

Military Web Sites Security Leaks Worse Than Soldier Bloggers

- An Army audit found official military websites more prone to security leaks than soldiers' blogs.

Bot Attacks Swarm Universities

- Malicious botnets are attacking European college and university networks, according to SecurityFocus.com.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.