TITLE

Reduce the risk of cybersecurity breach

AUTHOR(S)
Ireland, Ben; Coren, Benjamin
PUB. DATE
May 2019
SOURCE
Travel Weekly (UK);5/23/2019, Issue 2476, p11
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that Advantage Travel Partnership members were urged to beef up their cybersecurity to help reduce the risk of their websites being cloned or customers' data being stolen.
ACCESSION #
136811802

 

Related Articles

  • Cyber plan's future bleak. Fisher, Dennis // eWeek;2/24/2003, Vol. 20 Issue 8, p1 

    Reports on problems within the U.S. federal government's security community that prohibits the implementation of the initiatives suggested by the National Strategy to Secure Cyberspace. Unlikely implementation in the overall state of network security due to the obstacles; Need for people with...

  • DEFENDING CYBERSPACE. Graves, Brad // San Diego Business Journal;3/19/2012, Vol. 33 Issue 12, p1 

    The article discusses the efforts in San Diego, California to defend its cyberspace from hackers, including the increase by San Diego State University and University of California (UC) San Diego of the area's computer security talent.

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Feb2014, Vol. 25 Issue 2, p12 

    This section offers news briefs related to cyber security in the U.S. as of February 2014, including the announcement by retail company Target that it may have compromised around 40 million credit and debit card accounts due to cyber attack, and the findings by German researchers on the...

  • Over 2 mln Romanian IPs involved in cyber security incidents.  // Regional Today;3/12/2014, p2 

    The article reports on the data received by the Romanian National Computer Security Incident Response Team concerning cyber security alerts in 2013.

  • Cybersecurity Threat Grows. Investor's Business Daily // Investors Business Daily;12/31/2014, pA01 

    2 Attacks at

  • A critical problem.  // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2015, p5 

    An introduction is presented in which the editor discusses various reports within the issue on topics including the attacks on utilities and the threat of high-level attack on critical infrastructure, the keys to securing control systems or cyber-security, and the use of threat intelligence.

  • APCO speaker outlines potential PSAP cybersecurity strategies in heightened threat environment. Toone, Stephanie // Urgent Communications Exclusive Insight;11/19/2015, p1 

    The article offers public-safety answering points (PSAP) cybersecurity strategies.

  • ASSESSING COMPREHENSIVE SECURITY APPROACHES IN ACTION: AN INTRODUCTION. Sweijs, Tim; Jovanovic, Milos // Information & Security;2015, Vol. 33 Issue 1, p1 

    The article presents an introduction to the journal on assessing comprehensive security approach.

  • COMPREHENSIVE SECURITY AND SOME IMPLEMENTAL LIMITS. PREZELJ, Iztok // Information & Security;2015, Vol. 33 Issue 1, p13 

    The changing security environment has led to the development of comprehensive security approaches, strategies and policies. The 'Holistic approach' has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics