Securing PC Users, In Spite of Themselves

Ross, Alan
September 2007
Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p118
Trade Publication
The article focuses on the significance of security measures for the enterprise network and its many devices given the complexities of risk factors. It is noted that the secure configuration management is an integrated and pragmatic approach to protecting devices and the network despite user mischief and other factors. As a matter of fact, the building and provisioning of clients is the first element in the secure configuration management domain.


Related Articles

  • Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk? Baskerville, Richard L. // Cutter Benchmark Review;Dec2005, Vol. 5 Issue 12, p5 

    The article discusses the practices employed in information technology risk management by modern business organizations. Specific security safeguard approaches including economic rationality, adoption of security standards and a comprehensive risk management program were adopted to counteract...

  • Improving Information Assurance Education Key to Improving Secure(ity) Management. Kabay, M. E.; Bernstein, Lawrence // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p247 

    The article focuses on security management education. Hundreds of millions of newly Internet-attached computer users are novices uneducated even in the basics of security and security management. Similarly, many network and system managers of enterprise and service provider IT resources have a...

  • Are you Preventing Data Losses?  // Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p16 

    The article reports on the study conducted by Ponemon Institute LLC regarding data protection in 2009. The study found out that there are 58% of companies which believe that data protection is crucial as part of their risk management, while 12% of companies are in doubt. The study also claimed...

  • TAKING STOCK OF SECURITY.  // eWeek;07/31/2000, Vol. 17 Issue 31, p40 

    Editorial. Addresses issues in computer system security. Vulnerabilities; Management of risk; Viewing security as a business issue; Fundamental difference of system security from other aspects of information technology (IT); Good security policies.

  • Converged security pays dividends. Ting, David // Network World;6/18/2007, Vol. 24 Issue 24, p32 

    The article discusses the significance of security convergence to users and security staff. According to the author, the benefits of security covergence include the promotion of subtle changes to employee behavior that increase overall security, strengthens ability for companies to enforce...

  • HOW TO TAKE A COMPUTER DISASTER IN STRIDE. Hanna, Gregory // Strategic Finance;Jan2005, Vol. 86 Issue 7, p49 

    The article offers risk management strategies to handle corporate computer disasters. Experts say the ideal strategy in dealing with computer disasters is to work right through them, even if the company's offices are impacted. They say it is critical to prevent such disasters through security...

  • Umbrella Group Seeks to Bridge ID Management. Adams, John // American Banker;8/11/2009, Vol. 174 Issue 153, p11 

    The article examines the Kantara Initiative, a consortium attempting to create standardization of proprietary online identity management programs in banking automation and electronic commerce. The organization will attempt to involve banks in this project by stressing the business advantages of...

  • Infosecurity Europe 2006: Six new year resolutions for IT Security Managers.  // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p10 

    The article presents suggestions which are helpful for information technology security managers' protection of cardholder's information. These include building and maintenance of a secure network, data protection, maintenance of a vulnerability management program, implementation of strong access...

  • The Top Ten Mistakes in Risk Management. Teuten, Peter C. // Financial Executive;Sep2005, Vol. 21 Issue 7, p45 

    The article presents common mistakes made by businesses pertaining to risk management. Many companies ignore the element of risk that exists within every business practice. Experts say organizations should undergo a comprehensive risk assessment by independent experts. Organizations often fail...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics