Tag: pose

SME workers pose top security risk 
By Shaun Nichols | Jun 4, 2008 | Comment Now 
Employees at small and medium-sized companies are more likely to engage in behaviour that puts their employers at risk, according to a new survey..
 
SME workers pose top security risk 
By Shaun Nichols | Jun 4, 2008 | Comment Now 
Small firms without the luxury of a dedicated IT department most at risk.
 
Violent video games pose public health risk 
By Iain Thomson | Nov 30, 2007 | Comment Now 
A team at the University of Michigan claims to have found evidence that violent computer games can harm children..
 
Office-based employees pose greater threat than remote workers 
By Fiona Raisbeck | Oct 11, 2007 | Comment Now 
Nearly half of companies believe office-based employees pose a greater threat to the corporate network than remote workers, a new poll reveals.
 
Windows StickyKeys could pose security risk 
By Shaun Nichols | Mar 19, 2007 | Comment Now 
Microsoft dismisses claims of vulnerability in software component.
 
Christmas MP3 players pose serious corporate security risks 
By William Eazel | Dec 7, 2005 | Comment Now 
Companies need to take steps to protect themselves from “very serious security threats” which will be posed by MP3 players received as Christmas presents being brought into ...
 
Debate» Voice over IP networks pose a security threat to enterprises and their users 
 
Saddam death worm and IM virus pose new threats 
By David Quainton | Feb 3, 2005 | Comment Now 
A new virus is worming its way around the internet posing as evidence that Saddam Hussein is dead. Cashing in on the continued unrest and interest in Iraq the worm spreads via ...
 
Wi-Fi hotspots pose corporate security risk 
By Ian Schenkel | Jul 13, 2004 | Comment Now 
Wi-fi has exploded across Britain this year, and is set to continue growing. The capability to improve mobile working means that wireless technology is allowing networked ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote