risk

Software sales at risk with multiple core PCs

Software sales at risk with multiple core PCs

Software prices could skyrocket to unaffordable levels for many users in coming years as computer hardware evolves to multiple core models, a Gartner analyst has claimed.
Fleur Doidge Nov 30 2004 12:00AM Hardware
IM: an increasing security risk

IM: an increasing security risk

Instant messaging (IM) is the fastest growing security problem facing firms today, a new survey claims. A rising number of companies are banning IM as a result of the wide-ranging security issues associated with the system.
David Quainton Nov 15 2004 6:00PM Security
Risk analysis is revisited with a fresh approach

Risk analysis is revisited with a fresh approach

Peter Stephenson Nov 12 2004 5:04PM Security
ATMs might be at risk of another virus attack

ATMs might be at risk of another virus attack

Staff Writers Nov 12 2004 5:02PM Security
Users warned of spam risk

Users warned of spam risk

An email security firm is warning users to be wary of clicking on the opt-out link in spam emails.
Vivienne Fisher Oct 6 2004 12:00AM Security
Apple recalls fire risk PowerBook batteries

Apple recalls fire risk PowerBook batteries

Apple has recalled 28,000 rechargeable batteries used in its 15in PowerBook G4 computer worldwide after fears arose that they might burst into flames.
Fleur Doidge Aug 20 2004 12:00AM Hardware
Wi-Fi hotspots pose corporate security risk

Wi-Fi hotspots pose corporate security risk

Wi-fi has exploded across Britain this year, and is set to continue growing. The capability to improve mobile working means that wireless technology is allowing networked enterprises to tap into the true potential of their employees. But mobile users accessing the internet from corporate machines in Wi-fi hotspots are often doing so with little or no security controls in place. This could lead to network infection, which can have dramatic financial and operating consequences. With the average corporate enterprise infection costing an estimated £33,000 to repair, preventing infection at Wi-fi hotspots is a critical concern for many organisations.
Ian Schenkel Jul 13 2004 11:17AM Security
Smartphones are great tools, but at what risk?

Smartphones are great tools, but at what risk?

Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett Jul 8 2004 4:15PM Security
Second hand laptops at risk

Second hand laptops at risk

Seventy per cent of formatted second hand laptops contain retrievable data.
Dan Ilett Jun 9 2004 4:53PM Security
Gartner warns of 'very high risk' to Windows users

Gartner warns of 'very high risk' to Windows users

Security analysts at Gartner believe a flaw in Windows may be used to create a worm similar to last year's devastating "Blaster".
Jon Tullett Feb 17 2004 6:58PM Security
Corporations Risk Harboring Infoterrorists through Negligence

Corporations Risk Harboring Infoterrorists through Negligence

Terrorism is not a new phenomenon but has gained special popularity recently.
Jacques Halé Jan 19 2004 11:30AM Security
The ‘Risk Gap’: Business Perspectives on Security

The ‘Risk Gap’: Business Perspectives on Security

The dramatic rise in the pace and sophistication of cyberattacks is resulting in real financial and operational losses to major corporations.
Bruce Murphy Jan 16 2004 10:58AM Security
ROI Strategies for Reducing Risk

ROI Strategies for Reducing Risk

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 3:04PM Security
Networks Risk Grounding Without Airport-Level Security

Networks Risk Grounding Without Airport-Level Security

It is one of the old security adages that the nature of the threats to networks are ever-changing.
Nigel Hawthorn Jan 15 2004 10:40AM Security
Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Today's security measures are not keeping up with today's security risks.
John Bernardi Jan 14 2004 1:39PM Security
Danger money: The challenge of risk management

Danger money: The challenge of risk management

There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes Jan 13 2004 12:46PM Security
Real risk or shadow? The threat of cyberterrorism

Real risk or shadow? The threat of cyberterrorism

Digital attacks often mirror attacks in the real world. Illena Armstrong asks if they are inevitable and how to respond.
Illena Armstrong Jan 13 2004 10:38AM Security
Security Policy Management: Email Risk Controls

Security Policy Management: Email Risk Controls

E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James Jan 12 2004 12:32PM Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch Jan 12 2004 10:13AM Security
Review: Exchange Security Risk Auditor

Review: Exchange Security Risk Auditor

Administrators often forget that management of emails isn't simply a question of who can send or receive them, or the content. When email arrives it sits in the inbox, but who has permission to access that inbox, or other folders for that matter?

With high turnovers of employees becoming increasingly common, the stressed administrator may well lose track of individual permissions. For example, many companies usually have a set of freelance or contract email ­ accounts that can be assigned to temporary staff. The permissions required by one contractor may be far more extensive than those required by their successor, but they could very well inherit those permissions when they arrive. And human nature being what it is, inquiring minds will almost certainly take advantage of this, whether innocently or maliciously.

Craig Hinton Feb 1 2003 12:00AM Security

Log In

  |  Forgot your password?