Losing Customer Trust

Allen, Martin
February 2006
Credit Control;2006, Vol. 27 Issue 2, p57
Trade Publication
The article focuses on the effect of security breaches on companies in the banking and finance sector. Security breaches can have a devastating effect on companies, like Boeing Co. who lost a laptop containing personal financial data on 161,000 current and former employees. The author examines how Boeing handled the problem and outlines a contingency plan that companies should use to mitigate security breaches.


Related Articles

  • The changing face of data protection. Wood, Denise // Sports Car;Dec2013, Vol. 24 Issue 12, p16 

    In this article, the author focuses on the changing aspects of business and consumer data protection. She informs that information technology (IT), sakes and customer services departments should know IT security policies and standards and she states that businesses should be aware of latest...

  • Rights Management Services. Foster, Karen // Windows IT Pro;Oct2004, Vol. 10 Issue 12, p17 

    Focuses on the survey conducted by Karen Forster to the readers regarding the application of Windows Rights Management Services (RMS) in securing the sensitive information of companies. Overview of the functionality of RMS; Discussion about the implementation and use of RMS; Main reasons why...

  • Approaching a Market Size for PSIM. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p40 

    In this article the author focuses on the market size approach for physical security information management (PSIM) in the business security industry. He gives a clearer understanding on how PSIM works in the business and how security executives benefit from PSIM. He also presents a convergence...

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • Secure By Design. Raikow, David // CIO Insight;Aug2008, Issue 96, p22 

    The article presents a process that will enable information technology (IT) professionals develop a security policy that will meet the needs of their business enterprises. It says that the first step in making a security policy is defining clear priorities based on an effective risk assessment....

  • Enterprise Security Audits. Ali Pabrai, Uday O. // Certification Magazine;Sep2005, Vol. 7 Issue 9, p30 

    This article focuses on the importance of auditing to computer security in business enterprises. Security audits provide a methodical examination and review of the enterprises defenses, resulting in an audit report that summarizes findings and provides details about problems or concerns....

  • CLASSIC, MODERN, AND POST-MODERN APPROACHES TO MAKING SECURITY STRATEGY. Tagarev, Todor; Ivanova, Petya // Proceedings of the International Conference on Information Techn;2009, Vol. 1, Special section p7 

    The article describes classic, modern and post-modern approaches to making security strategy. Security strategy is defined in the article as the art and science of developing, applying, and coordinating the instruments of national power to achieve national security objectives. The challenges of...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics