Protection of information systems is too lax too often, expert says
- Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23
Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.
- Businesses ignore computer security. // Internal Auditor;Jun96, Vol. 53 Issue 3, p11
Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.
- Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18
Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.
- You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39
Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.
- Before disaster strikes: 12 steps to minimize computer losses. Storkman, Wayne D. // Outlook;Spring94, Vol. 62 Issue 1, 4th Annual Computer... p10
Offers steps to minimize computer system failure or data loss related to a disaster. Performing regular and complete backups; Practicing restoring from backups; Documenting backup procedures; Storing backups off-site or out of state; Prearranging alternative computer facilities and...
- Computer system buddies. McCready, Donald C. // Ohio CPA Journal;Dec94, Vol. 53 Issue 6, p47
Discusses several preventive measures in using computers. Backup devices; Uninterruptible power supply; Diagnostic utilities; Virus protection software; Environmental control equipment; Complementary metal oxide semiconductor (CMOS) printout.
- Locking up your laptop. M.M.S.; O'Malley, Chris // Popular Science;May93, Vol. 242 Issue 5, p42
Comments how Kensington Microware of San Mateo, Calif., aims to set a standard for portable security with its MicroSaver Security System, a plug-shaped lock that fits into a slot built into the computer and ties it to a desk or table with a six-foot steel cable. Other solutions from PC Guardian...
- Responding to privacy concerns of consumers. Kakalik, John S.; Wright, Marie A. // Review of Business;Fall96, Vol. 18 Issue 1, p15
Reports on threats to the privacy of consumers, and the conflict between commercialization of personal information, resulting from advances in technology. Reference to information on data banks accessed by computer systems; Question on the seriousness of the threat to privacy; Information on...
- Computer security: Deciphering the FUD factor. Boyd, John // Computing Japan;Mar1998, Vol. 5 Issue 3, p23
Focuses on the FUD factor (Fear, Uncertainty, and Doubt), relating to computer security. Comments from Koji Natgatsuna, an electronic commerce analyst with the Gartner Group Japan; Detailed information on electronic cryptography; Reference to encryption in Japan; Discussion on the FUD factor...
- Legislators mull computer security. Rodger, Will // Inter@ctive Week;02/17/97, Vol. 4 Issue 4, p34
Addresses the issue of the lack of computer security in the United States, while providing information on the explanation of the issue by a panel of six computer scientists before the House Subcommittee on Technology. Reasons for the increased attention given to the issue; Information on the...