TITLE

3 in 4 HK businesses to embrace interconnection by 2017

PUB. DATE
October 2015
SOURCE
Asia Cloud Forum;10/14/2015, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports commercial sector in Hong Kong, China to adopt interconnected enterprises, discussing its benefits and obstacles to cyber security and consumers and popularity of multi-cloud interconnectivity in Hong Kong.
ACCESSION #
110352278

 

Related Articles

  • Ask Dr. Intranet. Blass, Steve // Network World;05/29/2000, Vol. 17 Issue 22, p47 

    Replies to an inquiry on the installation of a firewall by a company planning to link to the Internet. Options of enterprise networks in placing firewalls; Key factors to consider when deciding to install a firewall.

  • Secure systems whack hackers. Davis, Marc // Crain's Chicago Business;10/02/2000, Vol. 23 Issue 41, pSR28 

    Examines ways in which businesses can secure their Web sites and computer networks. Security options; Features and functions of firewalls; Development of a system of personal identification numbers and passwords; Encryption of Internet transmissions.

  • Personal Use Superceded by Protecting Information.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p75 

    Reports on the 15th Annual Employment survey showing that companies are more concerned with protecting company information than employees' personal use of the Internet and electronic mail. Companies' implementation of written policies and procedures regarding employees' Internet use; Limitation...

  • Security pro tells how to beat hackers. Katz, David M. // National Underwriter / Property & Casualty Risk & Benefits Manag;8/05/96, Vol. 100 Issue 32, p7 

    Reports on Wizard's Keys Corp. vice president Carole Fennelly's advice on how to beat hackers. Fennelly's experience with a break-in in 1991; Steps to follow in forming a corporate Internet security policy; Key issues an Internet security policy should focus on; Need to establish specific...

  • PRIVACY Risk Management. Chaudhary, Raj; Lucas, Michael // Internal Auditor;Oct2014, Vol. 71 Issue 5, p37 

    The article focuses on the role of internal auditing in protecting a company's confidential data against cyber breaches, which according to the report "2014 Cost of Data Breach Study" cost a U.S. company 5.9 million U.S. dollars in 2013. Topics discussed include The American Institute of...

  • EDITORIAL. Dhillon, Gurpreet // Journal of Information System Security;2014, Vol. 10 Issue 1, p1 

    An introduction is presented in which the editor discusses topics within the issue including need of information security in business enterprises, surveys on cyber-security, generative control theory and losses in information security.

  • The cybersecurity threat is real ... so commit. Shipchandler, Shamoil T.; Riley, Rachel M. // Inside Counsel (SyndiGate Media Inc.);6/8/2015, p7 

    The article discusses the need for law firms to be committed in their efforts intensify their cybersecurity measures. Topics discussed include cybersecurity risks affecting every industry including schools, the government and the retail industry, reasons behind groups' cyberterrorism efforts...

  • Managing the risk of IoT. Sorebo, Gib // Control Engineering;Sep2015, Vol. 62 Issue 9, p33 

    The article presents six ways to effectively manage security risks that comes with the use of the Internet of Things (IoT), which includes identifying existing IoT implementations in place, planned or anticipated, adopting security policies or procedures related to IoT and participating in...

  • THE NEW REALITY OF CYBERSECURITY. Tuttle, Hilary // Risk Management (00355593);Oct2015, Vol. 62 Issue 8, p21 

    The article focuses on steps in developing a cybersecurity strategy to protect company assets from digital invasion. Topics include assessing a company's cybersecurity through its policies, procedures, training and risk management, acquiring the services of an insurer, and having a robust,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics