your

How safe are your health records?

How safe are your health records?

One of the main reasons why people are resisting Internet banking is due to concerns around IT security.
Temp User Aug 10 2007 2:25PM Security
Using international standards in your compliance program

Using international standards in your compliance program

In a world of ever-increasing information, security requirements and regulations, companies must manage a complex compliance environment that has resulted in a multitude of linked processes.
Gary Pearsons, Aug 7 2007 4:02PM Security
Don't post your email

Don't post your email

You wouldn't post your home address on a public website. You should be just as careful with your work email address.
Ken Munro, Jun 19 2007 1:43PM Security
Streamlining your documents with Open Office XML

Streamlining your documents with Open Office XML

OPINION - Electronic documents are at the centre of every modern organisation, capturing critical business information for use now and in the future.
Sarah Bond Jun 6 2007 11:48AM Software
Google offers to archive your web history

Google offers to archive your web history

Google is touting a new service that keeps a complete archive of a user's web browsing history.
Shaun Nichols Apr 24 2007 12:18PM Storage
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
Train employees - your best defense - for security awareness

Train employees - your best defense - for security awareness

With so many security threats on the horizon, it may be comforting to know the strongest security asset is already inside the company employees.
Luis Navarro, Feb 21 2007 8:45PM Security
How to protect your business from VoIP threats

How to protect your business from VoIP threats

As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritised quality and reliability over security, with few security measures being built in.
Neel Mehta, Feb 19 2007 9:57AM Security
Pretexting - white lies that can damage your company

Pretexting - white lies that can damage your company

In the wake of recent news at HP, pretexting has become the hot topic in the business world, and its sudden rise to fame broaches numerous questions including: What exactly is pretexting? How are companies liable for it? What are companies doing that is considered pretexting and how can they protect themselves from becoming the next HP?
Matt Leonard, Feb 19 2007 9:21AM Security
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Joe Sturonas, Jan 29 2007 6:33AM Security
Good enough for your business?

Good enough for your business?

If you're part of a financial institution, chances are you've memorised the Federal Financial Institutions Examination Council (FFIEC) guidance chapter and verse, and, with risk assessment in hand, are in the midst of rolling out some form of consumer authentication.
Joe DeSantis, Jan 24 2007 12:37AM Security
'Make your own man-in-the-middle attack' online kit found

'Make your own man-in-the-middle attack' online kit found

Fraudsters are hawking free trials of "universal" man-in-the-middle phishing kits through an online forum, security researchers said today.
Dan Kaplan Jan 10 2007 6:09PM Security
Is someone listening to your keyboard?

Is someone listening to your keyboard?

Floppies are obsolete, CRT monitors are a dying breed and CPU cores are multiplying every year. Since the early days of modern computers, research companies have redesigned, reinvented and revolutionised every aspect of computers except one: the ever faithful keyboard.
Gil Sever, Jan 2 2007 10:57PM Security
Match your company policies with your solutions

Match your company policies with your solutions

The headlines are scary for both CIOs and the companies they work for. "Stolen Computer Holds Information of 16,000 Driver's License Holders," "Vulnerability Auctions Killing Responsible Disclosure," "Hacking for Dollars: Is The Botnet Battle Already Lost?" "Online Brokerage Account 'Incursions' Worry SEC."
Dan Farmer, Jan 2 2007 9:30PM Security
Tailor your mobile security plan for the iPod generation

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network.
Andre' Muscat, Dec 27 2006 9:39PM Security
Make sure your end users are in compliance

Make sure your end users are in compliance

With the ubiquity of the internet, Wi-Fi hotspots and USB devices, the possibilities for unauthorised software on company PCs now seem endless.
Todd Brennan, Dec 11 2006 11:36AM Security
Industry views: Who's stealing your brand name?

Industry views: Who's stealing your brand name?

It has been estimated that there are US$50 billion of illegal counterfeit and gray market goods sold on the internet annually and with the amazing growth in popularity of online auction sites and business-to-business (B2B) exchanges, all indications are that this trend is going to get worse before it gets better.
Laura Mather, Nov 21 2006 10:23PM Security
MSSPs: At your service

MSSPs: At your service

With security becoming increasingly complex to manage, formerly reluctant organisations are embracing outsourcing, says Rob Buckley.
Rob Buckley Nov 13 2006 1:31PM Security
Editorial: Security boosts your brand

Editorial: Security boosts your brand

How often does the word "brand" pop up in conversations with your fellow professionals? I'd stick out my neck and say hardly ever.
Paul Fisher Oct 2 2006 2:48PM Security
Kingston Flash drives turn any PC into your own

Kingston Flash drives turn any PC into your own

The end of the laptop?.
Andrew Charlesworth Sep 8 2006 10:13AM Hardware

Log In

  |  Forgot your password?