TITLE

Perimeters Protected, Firms Look Inward

AUTHOR(S)
Groenfeldt, Tom
PUB. DATE
March 2008
SOURCE
Securities Industry News;3/24/2008, Vol. 20 Issue 12, p9
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that financial firms are becoming more concerned about internal security threats. According to Mark Nicholson, COO at information security consultancy firm Vigilant, firms are shifting the focus of their security policy from external hackers to internal threats. Financial firms are improving controls on what employees can do, as well as security infrastructures to protect data when customers cross the firewalls.
ACCESSION #
31509735

 

Related Articles

  • Brokers need to protect reputation against data loss. Blackwell, Mark // Mortgage Strategy;6/25/2012, p032 

    The article discusses the importance of data security. It advises mortgage firms to safeguard wireless fidelity (wifi) network security in order to protect sensitive corporate and consumer data. It cites a case involving Google's Street View application which allegedly harvested personal data...

  • AntiSniff.  // Network Dictionary;2007, p36 

    A definition of the term "AntiSniff" is presented. It refers to a network monitoring tool that remotely detects whether a computer is doing packet sniffing or in promiscuous mode. Sniffing condition could mean that the system administrator has intentionally or accidentally left the computer in...

  • Don't fall prey to breaches in data security. Gallo, Stan // Keeping Good Companies (14447614);Nov2011, Vol. 63 Issue 10, p600 

    The article reports on the challenges and opportunities posed by the online business environment. It cites the benefits of the cyberspace to businesses, including one-on-one client interaction and mobile interaction. The article also emphasizes the need for organisations to be proactive in...

  • THREAT OF THE MONTH. Socas, James // SC Magazine: For IT Security Professionals (15476693);Nov2015, Vol. 26 Issue 11, p13 

    The article offers information on how to protect the point of sale (POS) systems from exfiltrate data attack through network infiltration techniques to prevent data breaches through cloud-based security tools.

  • Corruption.  // Network Dictionary;2007, p124 

    A definition of the term "Corruption" is presented. In the context of information security, it refers to a threat action that alters system operation by modifying system functions or data.

  • SYN Scanning.  // Network Dictionary;2007, p471 

    An encyclopedia entry for "SYN Scanning" is presented. It refers to a type of stealth scan that makes use of SYN packets. It can be used by a malicious hacker to determine the state of a communication port without establishing a full connection. Sometimes, this method is used to perform a...

  • HOW TO BEST PROTECT YOUR DATA. WELSCH, ANDREW // On Wall Street;Feb2015, Vol. 25 Issue 2, p17 

    The article offers tips for investment advisors on how to prevent data security failures. Topics discussed include the data breaches at major companies such as J. P. Morgan, Sony and Morgan Stanley, the need for advisors to understand their firm's existing policies and protections, and the...

  • Keeping to ourselves. Paonita, Anthony // Inside Counsel (SyndiGate Media Inc.);1/4/2016, p4 

    An introduction to articles published within the issue is presented, including discussions of data privacy and breaches, and articles on how businesses and their legal department should approach data privacy and protect the privacy of their clients, vendors and customers.

  • What Banks Need to Know from Verizon's Comprehensive Breach Report. Crosman, Penny // American Banker;4/14/2015, Vol. 180 Issue 56, p1 

    The article discusses the 2014 Data Breach Investigations Report released by U.S. telecommunications company Verizon Communications. Topics include the majority of confirmed data breaches in the U.S. , the estimated financial loss of compromised records, and insights from the data which banks...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics