dcsimg

Most Recent Data Security

CMS Security Could Be Your Company's Weak Spot

January 12, 2010 |
Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder
READ MORE

Cyber Protesting on the Rise

January 08, 2010 |
A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a
READ MORE

Be Smart with Smartphone Security Policies and Practice

January 07, 2010 |
With all the fuss this week about the release of Google's new smartphone, this is a good time to remember that smartphones operate more like a computer than a phone and they need the same care as the
READ MORE

Google Chrome's Troublesome Weaknesses

January 06, 2010 |
When the Google Chrome Web browser was released at the end of 2008, a number of my IT acquaintances advised me to make the switch, especially since it would be more stable and secure than IE.  
READ MORE

Security Theater: The Latest Buzz Phrase

January 04, 2010 |
The term "security theater" may have been around for a while, but it seems to be on everyone's lips since the failed terrorist attack on Christmas Day.   Security theater is the intention to
READ MORE

A New Year Deserves New Security Strategies

December 30, 2009 |
With the news of the latest terrorist attempt and revamped security efforts for travelers dominating the headlines the past few days, I couldn't help but think about how important it is to be
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Enforcement Key to a Strong Security Policy Plan

December 29, 2009 |
Earlier this month, I posed the question: Does your company need a security audit plan?   A good security audit will show that most security breaches are preventable. An article at IT Security
READ MORE

Nation Is Long Overdue for a Security Czar

December 23, 2009 |
You've probably heard the news by now-President Obama has appointed Howard Schmidt as the new Cyber Security Czar. I don't know what concerns me more: that it took the Administration since August
READ MORE

Making Sure Security Employees' Skills Stay on Par with Hackers'

December 21, 2009 |
My son is majoring in IT security in college, and this weekend, someone asked him what traits a company should look for in an IT security employee. My son smiled slyly and said, "Good hacking
READ MORE

Do Your Employees Respect Sensitive Data?

December 18, 2009 |
Earlier this month, a TSA manual was posted to the Internet. It listed sensitive information on how passengers are targeted for secondary screening. TSA officials said the document was an old
READ MORE