TITLE

How Secure Is Your Client Data?

AUTHOR(S)
Clarke, Eric
PUB. DATE
January 2009
SOURCE
Journal of Financial Planning;Jan/Feb2009 Practice Management, p24
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article presents five questions financial planners should ask their information-technology professional regarding computer security. Software vendors frequently provide security updates, and planners need to know what the firm’s policy is for installing these. Inquire about whole-disk encryption programs for the firm’s laptop computers. Find out whether firewalls, anti-virus software, and other measures are in place to protect the company’s local area network. Ask what steps are taken to ensure that old data and hardware are being disposed of safely. Find out what practices might be adopted to ensure workplace safety.
ACCESSION #
36321870

 

Related Articles

  • Songs Of Separation. Devlin, Grem // Living Tradition;Feb/Mar2016, Issue 112, p59 

    No abstract available.

  • Six ways to limit your exposure to cyber attacks. Pierson, Christopher T. // Inside Tucson Business;1/24/2005, Vol. 14 Issue 33, Special section p1 

    This article focuses on cyber security. Businesses that store data in a digital format should have their security assessed by legal and information technology professionals. Using a firewall is much like closing and locking the doors to your home or office. Entry and exit are only allowed to...

  • SCS 2.0 beefs up desktop defense. Garcia, Andrew // eWeek;4/26/2004, Vol. 21 Issue 17, p58 

    With Symantic client Security 2.0, Symantec Corp. extends its desktop-based defenses against blended attacks by offering stalwart anti-virus protection, much-improved firewall and intrusion detection capabilities, and even a handy new adblocking engine. With SCS 2.0, IT administrators will find...

  • KERIO WINROUTE FIREWALL 6.1 ADDS CLIENTLESS SSL-BASED VPN.  // Computer Security Update;Aug2005, p4 

    The article reports that Kerio Technologies Inc., a provider of Internet messaging and firewall solutions for small to medium- sized organizations, has announced that Kerio WinRoute Firewall 6.1, its flagship network security product, has added robust Clientless SSL-based VPN and transparent...

  • The New Law Firm Challenge: Confronting the Rise of Cyber Attacks and Preventing Enhanced Liability. Mandell, David; Schaffer, Karla // Law Practice Today;Mar2012, p10 

    The article discusses the importance for law firms to implement enhanced security measures for networks and servers to prevent cyber attacks and enhanced liability. To control access to the network based on a predetermined set of rules, the author emphasizes the absolute need for a firewall that...

  • RECENT RELEASES.  // Information Security;Nov2005, Vol. 8 Issue 11, p73 

    Features several information security software and device released as of November 2005. Thunder 2.0 Security Event Manager software from Tenable Network Security; CounterPoint 2.2 network security appliance software from Mirage Network; PRO 4100 firewall from SonicWALL.

  • Attacks should not be a trigger. Bartlett, Jeannine // SC Magazine: For IT Security Professionals;Jan2005, p82 

    This article presents 4 ways to keep computer security policies up-to-date with the evolution of Web applications. First, add volatility metrics. Risk assessment is used to determine which assets to protect, typically by determining the relationship between the value of the information and its...

  • LOCK DOWN. Johnson, Simon // Australian Personal Computer;Jul2004, Vol. 24 Issue 7, p73 

    Firewalls, antivirus, antispam and malware detection products are all must-haves for any Internet user. Many security software companies are turning their attention to detecting the latest spyware and adware. The non-viral malware detection market is in its infancy and has been dominated by a...

  • Securing your industrial control network. Schaffer, Dan // Plant Engineering;Nov2009, Vol. 63 Issue 11, pA15 

    The article offers tips for cyber security of industrial control networks in the U.S. It notes that control networks can be protected through the establishment of firewall, common security steps and the segmentation of control networks. It points out that the implementation of firewall...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics