TITLE

DON'T SPRING A DATA LEAK

AUTHOR(S)
Spangler, Todd
PUB. DATE
July 2006
SOURCE
Baseline;Jul2006, Issue 61, p15
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article considers the efforts made by companies to protect their data amidst the increasing incidents of lost or stolen laptops. Steven Zimmerman, vice president of technology risk management for Regions Financial Corp., used to face questions about the importance of computer security to their businesses. But lately, the lost laptop incidents made the businesses realized the importance of security by themselves. Organizations are unprepared for accidental or deliberate data breaches which are usually caused by insiders or employees who take their work to home. Gartner analyst Avivah Litan thinks that companies will be increasing their security projects to prevent information leak out, including deployment of software that stops sensitive data from being copied.
ACCESSION #
21513076

 

Related Articles

  • First Data's Second Layer of Security. Wolfe, Daniel // American Banker;9/22/2009, Vol. 174 Issue 176, p1 

    The author reports that a security format is being created by First Data Corp. which uses tokenization. Topics discussed in the article include questions that have been raised regarding data security due to data breaches that have occurred, criticisms that have raised regarding tokenization and...

  • Identity Theft Still A Growing Problem.  // Business Communications Review;May2007, Vol. 37 Issue 5, p6 

    The article discusses research that took place between 2003 and 2006 concerning identity theft. According to Gartner, identity theft has increased by more than 50 percent in that three year span, costing the average victim $3,257 in 2006, compared to $1,408 in 2005. Victims are also recovering...

  • Four ways to protect your info from cyber espionage. LeClair, Lee // Inside Tucson Business;12/21/2009, Vol. 19 Issue 29, p13 

    The article offers tips to protect the business information from cyber espionage. First, ensure to have a good firewall with an intelligent administrator who understands exactly what type of traffic goes into and out of the computer network. Next, ensure that the only systems visible to the...

  • Inside Job. Green, Robert P.; Dickinson, Glenn // California CPA;Jul2007, Vol. 76 Issue 1, p19 

    The article focuses on protection of intellectual property such as trade secrets and employee and customer personal information. According to government studies, most information-related breaches including unauthorized access to information and loss of laptop happen internally within the...

  • Computer security.  // Credit Management;Oct2008, p8 

    The article focuses on the call of the Information Commissioner to companies and public bodies to protect consumers data in Great Britain. About 94 security breaches were reported, wherein two thirds of which were committed by government or other public sector bodies. Meanwhile, a survey of over...

  • Latest Breach Preventable, Expert Contends.  // ISO & Agent Weekly;12/15/2011, Vol. 7 Issue 46, p27 

    The article presents the perspectives of Gartner Group vice president and security analyst Avivah Litan on preventing data breach in the U.S. Litan believes that data security breaches can be prevented by incorporating more breach and fraud prevention methods. Moreover, it mentions that hackers...

  • Intelligence key to protecting data against fraud and espionage threats. Ashford, Warwick // Computer Weekly;11/22/2011, p7 

    The article focuses on the importance of information security in businesses as the value of information assets increase and threats from cyber crime rise. It asserts that many of the organisations' information security is not well integrated with the entire business, which either limits the...

  • Record Data Breaches in 2007.  // Information Management Journal;Mar/Apr2008, Vol. 42 Issue 2, p16 

    The article discusses the increasing rate of data breaches in 2007, with more breaches expected in 2008. Statistics regarding the theft of personal records for the years 2006 and 2007 are presented, and the sources of the stolen data, including computer hackers and stolen laptops are identified....

  • Enforce your security plan.  // Computer Weekly;6/6/2006, p28 

    The article focuses on the computer security management with reference to the theft of data at the U.S. Department for Veterans Affairs. To lose a laptop may be regarded as a misfortune. To lose a laptop with 26.5 million IDs, including names, social security numbers and dates of birth, smacks...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics