your

How safe are your health records?

How safe are your health records?

One of the main reasons why people are resisting Internet banking is due to concerns around IT security.
Aug 10 2007 2:25PM
Using international standards in your compliance program

Using international standards in your compliance program

In a world of ever-increasing information, security requirements and regulations, companies must manage a complex compliance environment that has resulted in a multitude of linked processes.
Aug 7 2007 4:02PM
Don't post your email

Don't post your email

You wouldn't post your home address on a public website. You should be just as careful with your work email address.
Jun 19 2007 1:43PM
Streamlining your documents with Open Office XML

Streamlining your documents with Open Office XML

OPINION - Electronic documents are at the centre of every modern organisation, capturing critical business information for use now and in the future.
Jun 6 2007 11:48AM
Google offers to archive your web history

Google offers to archive your web history

Google is touting a new service that keeps a complete archive of a user's web browsing history.
Apr 24 2007 12:18PM
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Mar 12 2007 11:41AM
Train employees - your best defense - for security awareness

Train employees - your best defense - for security awareness

With so many security threats on the horizon, it may be comforting to know the strongest security asset is already inside the company employees.
Feb 21 2007 8:45PM
How to protect your business from VoIP threats

How to protect your business from VoIP threats

As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritised quality and reliability over security, with few security measures being built in.
Feb 19 2007 9:57AM
Pretexting - white lies that can damage your company

Pretexting - white lies that can damage your company

In the wake of recent news at HP, pretexting has become the hot topic in the business world, and its sudden rise to fame broaches numerous questions including: What exactly is pretexting? How are companies liable for it? What are companies doing that is considered pretexting and how can they protect themselves from becoming the next HP?
Feb 19 2007 9:21AM
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Jan 29 2007 6:33AM
Good enough for your business?

Good enough for your business?

If you're part of a financial institution, chances are you've memorised the Federal Financial Institutions Examination Council (FFIEC) guidance chapter and verse, and, with risk assessment in hand, are in the midst of rolling out some form of consumer authentication.
Jan 24 2007 12:37AM
'Make your own man-in-the-middle attack' online kit found

'Make your own man-in-the-middle attack' online kit found

Fraudsters are hawking free trials of "universal" man-in-the-middle phishing kits through an online forum, security researchers said today.
Jan 10 2007 6:09PM
Is someone listening to your keyboard?

Is someone listening to your keyboard?

Floppies are obsolete, CRT monitors are a dying breed and CPU cores are multiplying every year. Since the early days of modern computers, research companies have redesigned, reinvented and revolutionised every aspect of computers except one: the ever faithful keyboard.
Jan 2 2007 10:57PM
Match your company policies with your solutions

Match your company policies with your solutions

The headlines are scary for both CIOs and the companies they work for. "Stolen Computer Holds Information of 16,000 Driver's License Holders," "Vulnerability Auctions Killing Responsible Disclosure," "Hacking for Dollars: Is The Botnet Battle Already Lost?" "Online Brokerage Account 'Incursions' Worry SEC."
Jan 2 2007 9:30PM
Tailor your mobile security plan for the iPod generation

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network.
Dec 27 2006 9:39PM
Make sure your end users are in compliance

Make sure your end users are in compliance

With the ubiquity of the internet, Wi-Fi hotspots and USB devices, the possibilities for unauthorised software on company PCs now seem endless.
Dec 11 2006 11:36AM
Industry views: Who's stealing your brand name?

Industry views: Who's stealing your brand name?

It has been estimated that there are US$50 billion of illegal counterfeit and gray market goods sold on the internet annually and with the amazing growth in popularity of online auction sites and business-to-business (B2B) exchanges, all indications are that this trend is going to get worse before it gets better.
Nov 21 2006 10:23PM
MSSPs: At your service

MSSPs: At your service

With security becoming increasingly complex to manage, formerly reluctant organisations are embracing outsourcing, says Rob Buckley.
Nov 13 2006 1:31PM
Editorial: Security boosts your brand

Editorial: Security boosts your brand

How often does the word "brand" pop up in conversations with your fellow professionals? I'd stick out my neck and say hardly ever.
Oct 2 2006 2:48PM
Kingston Flash drives turn any PC into your own

Kingston Flash drives turn any PC into your own

The end of the laptop?.
Sep 8 2006 10:13AM

Log In

Email:
Password:
  |  Forgot your password?