TITLE

Untitled

AUTHOR(S)
Savvas, Antony
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/20/2007, p107
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information related to the findings of a survey by the Web security firm Sophos PLC concerning data leakage via electronic-mail (e-mail). According to the findings of the survey, almost three-quarters of firms are concerned about data leakage via e-mail, as half of employees admit to sending e-mails to the wrong person. Sophos holds that the problem potentially caused corporate embarrassment, compliance breaches and the loss of business critical information. Sophos recently announced its e-mail security appliances could now prevent the loss of corporate data through e-mail leaks.
ACCESSION #
27962758

 

Related Articles

  • Information Security may be coming of age at last.  // Accountancy Ireland;Apr2004, Vol. 36 Issue 2, p63 

    Looks on information security concerns of business enterprises. Benefits of the Internet and the Web; Effect of spam, viruses and unauthorized access on business; Launch of the book "Information Security - A Strategic Guide for Business."

  • Bug Control. E. B. // Entrepreneur;Apr2004, Vol. 32 Issue 4, p34 

    With Internet onslaughts such as last year's SQL Slammer and Blaster, Vincent Weafer, senior director of Symantec's Security Response group in Cupertino, California says that the threats have changed. One can be attacked directly over the Internet by electronic mail, rogue Web sites, IM,...

  • www.  // Finance Week;8/2/2004 Supp Richer Life, p9 

    The article presents news for Internet users to help them avoid any spam or virus attack. There is completely a different scene on the computer when a person is on Internet . All sorts of colorfully named applications are saved without knowing. As a result of which some one can use the...

  • Do not allow instant messaging to undermine compliance efforts. Smith, Mark // Computer Weekly;4/12/2005, p28 

    The article reports that the use of instant messaging by employees is proving to be yet another headache for employers. Much has been written on the need to comply with new legislation, such as Sarbanes-Oxley or the Basel 2 code on risk management, but many organisations are struggling to find a...

  • One More Take on Identity. Miller, Jim // IEEE Internet Computing;Mar/Apr2009, Vol. 13 Issue 2, p99 

    The article focuses on the better approach in identifying Internet users who have the same name and in ensuring information security. It states the significance of extra numbers, letters, and other characters in keyboard for the proper identification of recipients. In addition, it highlights the...

  • What really happens when you make an e-mail error? Zavoina, Andy // ABA Banking Journal;Mar2003, Vol. 95 Issue 3, p62 

    Discusses how the misuse of company e-mail by employees may disrupt a corporation. Consideration of a nasty e-mail which was sent by the chief executive of the Cerner Corporation to managers and employees; How important e-mails may be misdirected on the Internet; Status of bank policies...

  • E-mail worm could wreak havoc.  // eWeek;1/30/2006, Vol. 23 Issue 5, p22 

    This article cites the threat caused by E-mail worm, which may crawl into in-boxes on the Internet. The security volunteers has raised an alarm for this potentially destructive e-mail worm, which is capable of destroying important documents on an infected machine. The worm uses the lure of...

  • Untitled. Ashford, Warwick // Computer Weekly;7/20/2010, p50 

    The article presents information on data protection laws in Great Britain, which are very lenient as revealed by organizations of the country. Ciaran Rafferty, vice president, Sophos PLC, Ireland, asks business enterprises to present their ideas to the government, on the betterment of data...

  • Is your website an easy target? Savage, Marcia // SC Magazine: For IT Security Professionals (UK Edition);Jan2005, p41 

    This article focuses on issues related to Web security. Web applications are notoriously prone to a range of vulnerabilities that attackers can easily exploit to access customer names, creditcard numbers and other sensitive data. Common attacks include structured query language (SQL) injection,...

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics