Data Security - Page 113

Securing your data and network, inside and outside the perimeter

Nation Is Long Overdue for a Security Czar

23 Dec, 2009

You've probably heard the news by now-President Obama has appointed Howard Schmidt as the new Cyber Security Czar. I don't know what concerns me more: that it took the Administration since August ...More >

Making Sure Security Employees' Skills Stay on Par with Hackers'

21 Dec, 2009

My son is majoring in IT security in college, and this weekend, someone asked him what traits a company should look for in an IT security employee. My son smiled slyly and said, "Good hacking ...More >

Do Your Employees Respect Sensitive Data?

18 Dec, 2009

Earlier this month, a TSA manual was posted to the Internet. It listed sensitive information on how passengers are targeted for secondary screening. TSA officials said the document was an old ...More >

Seven Improved Security Features in Windows 7

16 Dec, 2009

While no operating system is perfect, Microsoft appears to have made significant security improvements with the release of Windows 7. I've made a list of some of the best security features in Windows ...More >

Are Your Security Questions Secure Enough?

14 Dec, 2009

When an expert in data security says something scares him, I pay attention. In his AVG blog, Roger Thompson wrote that his credit card had been declined because of unusual activity and he had to take ...More >

Security Risk Trends for 2010

11 Dec, 2009

Last week, IT Business Edge's Susan Hall wrote of hope for an increase in IT spending in 2010. I hope some of those IT funds are focused on security because experts are predicting increases in data ...More >

Fight Hidden Dangers in Shortened URLs

10 Dec, 2009

When I first began writing on security issues, experts told me repeatedly that the best way to avoid viruses and falling for phishing scams was to hold my cursor over the link in the e-mail message. ...More >

Does Your Company Need a Security Audit Plan?

08 Dec, 2009

Some of the worst security breaches occur because a business was too lazy or too lax to properly protect its data. And too often, those breaches come from inside the company.   For example, an ...More >

Cell Phone Security Ignoring Risk to Sensitive Calls

04 Dec, 2009

We've been hearing about all sorts of risks from cell phones for years now. Though the jury is out on whether we might be poisoning ourselves with radiation while we talk away on our cell phone,we ...More >

Protecting Laptops and External Storage

01 Dec, 2009

This past July, 10 laptop computers and nine external hard drives were stolen from a Naval headquarters office. Luckily, the theft turned out to be less damaging than it could have been: Only one of ...More >

Pages:  First  « Prev111112 | 113 114Next » 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.