INFORMATION

Site Map - IT

New in Plain Text

-

A Look at Laptop Theft

-

The Road to Rational Decision-Making

- Most of us are lousy decision-makers, and unfortunately many of the decisions that we take as individuals or as a society can be both very wrong and have very harmful or costly consequences. But there are many tried and tested ways of making relatively sound decisions. Cost-benefit analysis, risk management, and related disciplines that rely on statistics, economics, the law, and psychology allow us to weigh choices rationally and increase the odds of making wise choices.

Arming the Road Warrior

- When employees travel on business, companies must ensure that their mobile computing does not put corporate data at risk.

The Price of Wireless Security

- A new survey finds companies will spend 10-20 percent more on security next year to protect their wireless networks and technology.

The Many Faces of Malware

- In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.

Behind the Numbers: A Surge in Phishing Attacks

-

Quick Bytes: Cyberwar Risk

- China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.

Numbers

- 85 The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.

Checking IT Backgrounds

- As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.

In Privacy We Trust

- A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Working in the Wild

- If a laptop is stolen, encryption software keeps data hidden, while tracking software "phones home," making it easy to catch the crooks.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.