TITLE

Keeping it Classified -- Data Theft Risks and Costs Exposed

PUB. DATE
April 2007
SOURCE
Credit Control;2007, Vol. 28 Issue 4/5, p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the risks posed by businesses that use electronic communications. Every business that engages in such forms of communication is at risk of electronic data theft. Theft or loss of customer records, business plans, and even sales presentations can result in legal action, brand damage or a rapidly decreasing customer base. The most common data breach is loss of confidential business information, which can cripple companies' operations.
ACCESSION #
27984273

 

Related Articles

  • ENCRYPTION: THE KEY TO SECURE DATA? Bradbury, Danny // Computer Weekly;4/26/2005, p44 

    The article focuses on the reliability of encryption in computer security. Encryption relies on encoding information in a way that makes it difficult to decode without either a key or an awful lot of mathematical muscle. The longer the length of the cipher, the more difficult it will be to...

  • TO Catch a Thief. Harris, Shon // Information Security;Dec2005, Vol. 8 Issue 12, p34 

    The article discusses the forensic requirements for information technology staff detectives. The team needs to understand all legal requirements, must gather and preserve evidence and have ability to present the information. Several tools for forensics teams include EnCase from Guidance...

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Feb2010, Vol. 21 Issue 2, p16 

    This section offers security news briefs. The U.S. Congress has passed the Data Accountability and Trust Act which requires organizations to notify all affected U.S. individuals concerning any breach of electronic data within their systems. A class action suit was filed against applications...

  • UK companies 'under-invest' in IT, Tory says. Thomson, Rebecca // Computer Weekly;10/9/2007, p50 

    The article presents the comments of Malcolm Harbour, the chairman of the Conservative Technology Forum, on British companies. Harbour, who is also part of the West Midlands Conservative MEP team, said that the government needs to do more to encourage British companies to invest in information...

  • Imperfect storm needs full-spectrum defense. Blum, Daniel // Network World;7/10/2006, Vol. 23 Issue 26, p31 

    The article offers advice on how to protect corporate data, avoid identity theft, and prevent corporate fraud. Companies should build a technical control system that integrates and interoperates across multiple platforms, applications, and security technologies. This requires improvements in...

  • Network Situational Assessment and Automatic Policy Change. Servin, Luis; Dörges, Till // IT Professional;Jul/Aug2007, Vol. 9 Issue 4, p18 

    The article discusses key issues concerning the Policy-based Security Tools and Framework (Positif) project, which is used to evaluate the security of computer networks and to maintain optimal working conditions using information from various devices and components of the network. The project,...

  • Continuous protection. Hope, Michele // Network World;12/26/2005, Vol. 22 Issue 51, p34 

    The article focuses on the benefits offered by continuous data protection (CDP) tools to early adopters. CDP products record any changes made to a specific file or to an application's underlying block-based data in real time. They are fueled by database applications that record ongoing changes...

  • CDP virtues.  // Network World;12/26/2005, Vol. 22 Issue 51, p34 

    The article cites some of the advantages of continuous data-protection (CDP) tools. CDP makes application data more available by eliminating the back-up window required by traditional back-up software. It also offers one of the lowest recovery-point objectives for restores and allows rapid and...

  • NWW changes afoot. Dix, John // Network World;6/25/2007, Vol. 24 Issue 25, p26 

    The article announces the journal's two new developments. The first development is a new electronic delivery tool called iDemand, which is the journal's next generation content delivery platform. The said platform is slick enough that it may just convince users to do away with the print version...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics