dcsimg

Most Recent Data Security

CMS Security Could Be Your Company's Weak Spot

January 12, 2010 |
Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder
READ MORE

Cyber Protesting on the Rise

January 08, 2010 |
A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a
READ MORE

Be Smart with Smartphone Security Policies and Practice

January 07, 2010 |
With all the fuss this week about the release of Google's new smartphone, this is a good time to remember that smartphones operate more like a computer than a phone and they need the same care as the
READ MORE

Google Chrome's Troublesome Weaknesses

January 06, 2010 |
When the Google Chrome Web browser was released at the end of 2008, a number of my IT acquaintances advised me to make the switch, especially since it would be more stable and secure than IE.  
READ MORE

Security Theater: The Latest Buzz Phrase

January 04, 2010 |
The term "security theater" may have been around for a while, but it seems to be on everyone's lips since the failed terrorist attack on Christmas Day.   Security theater is the intention to
READ MORE

A New Year Deserves New Security Strategies

December 30, 2009 |
With the news of the latest terrorist attempt and revamped security efforts for travelers dominating the headlines the past few days, I couldn't help but think about how important it is to be
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Enforcement Key to a Strong Security Policy Plan

December 29, 2009 |
Earlier this month, I posed the question: Does your company need a security audit plan?   A good security audit will show that most security breaches are preventable. An article at IT Security
READ MORE

Nation Is Long Overdue for a Security Czar

December 23, 2009 |
You've probably heard the news by now-President Obama has appointed Howard Schmidt as the new Cyber Security Czar. I don't know what concerns me more: that it took the Administration since August
READ MORE

Making Sure Security Employees' Skills Stay on Par with Hackers'

December 21, 2009 |
My son is majoring in IT security in college, and this weekend, someone asked him what traits a company should look for in an IT security employee. My son smiled slyly and said, "Good hacking
READ MORE

Do Your Employees Respect Sensitive Data?

December 18, 2009 |
Earlier this month, a TSA manual was posted to the Internet. It listed sensitive information on how passengers are targeted for secondary screening. TSA officials said the document was an old
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS