TITLE

Protecting from Identity Theft? A Good Start

AUTHOR(S)
Chronister, Dave
PUB. DATE
April 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p76
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents ideas about how organizations can better protect customer and employer databases from identity theft. It is important for security professionals to structure security solutions to identify threats, guard against automated scans and slow down and report possible intrusions. In the event of a successful attack, security officers should ensure containment and, if possible, identify the offenders of the data loss.
ACCESSION #
31658172

 

Related Articles

  • TAKING A BITE OUT OF IDENTITY THEFT. Lewis, Peter // Fortune;5/2/2005, Vol. 151 Issue 9, p36 

    The article mentions how companies mishandle personal data and recommends using a paper shredder at home. Last year, according to a Better Business Bureau report, more than nine million Americans were victims of identity theft. Security experts say that, contrary to popular belief, the majority...

  • Field guide to passwords.  // Consumer Reports;Jul2014, Vol. 79 Issue 7, p19 

    The article offers information on creating computer passwords that are complex enough to protect information but easy for the user to remember. Topics include warnings against simple number sequences or words as passwords as well as against using one's name and birthday, the disadvantages of...

  • Prioritizing Internet Security. Demers, Marie Eve // Electronic News;01/22/2001, Vol. 47 Issue 4, p46 

    Calls for Internet-based companies to increase investments that prioritize computer and data security. Estimated corporate loss from external hacking and internal piracy; Percentage of information technology budget spent on data security; Advice on the selection of a security company;...

  • FIDNet Alive And Searching For Dollars. Brown, Doug // Inter@ctive Week;04/03/2000, Vol. 7 Issue 13, p108 

    Focuses on the Federal Intrusion Detection Network (FIDNet) in the United States. Comments from Jim Dempsey of the Center for Democracy and Technology about the system; One of the problems of FIDNet; Proposed spending on the program in 2001; Criticism of the program in 1999.

  • Better Controls through Database Auditing. Gary, Ted // Database Trends & Applications;Jul2007, Vol. 21 Issue 7, p9 

    The article focuses on the worsening situation of data breach. Data from the Privacy Rights Clearinghouse tally reveals that data breach victims have reached more than 100 million records. This is attributed to the inadequacy of federal and state regulations designed to protect customers from...

  • It's April 16--Do You Know Where Your Tax Return Is?  // Strategic Finance;May2005, Vol. 86 Issue 11, p55 

    The article discusses the measures taken by the U.S. Internal Revenue Service (IRS) to protect its computer systems from external cyber threats. According to a 2005 report, the IRS has successfully utilized social engineering tactics to secure its computer network perimeters. The IRS warns...

  • Congress Assesses Data Security Proposals. Moye, Stacey // Information Management Journal;Jan/Feb2006, Vol. 40 Issue 1, p20 

    The article examines several measures aimed at preventing data breaches which have been proposed in the U.S. Congress as of January 2006. Identity Theft Protection Act S. 1408 would require covered entities to take steps to protect against security breaches and to prevent unauthorized access to...

  • Scope out your ID risks and goals. Macehiter, Neil // Computer Weekly;12/5/2006, p22 

    The article presents information on various steps that should be taken by business enterprises for identity management planning. The first step for identity management initiative involves understanding the business objectives and creating a roadmap to ensure decisions fit with business...

  • Creating a Culture of Security. Rega II, Rick // Funeral Home & Cemetery News;Nov2010, pA25 

    The article focuses on the creation of a culture of information privacy and security. It states that the effort should be focusing on the prevention of identity theft and information breaches from taking place. It calls on all people to accept the fact that they are the custodians of private...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics