How Secure Is Your Client Data?

Clarke, Eric
January 2009
Journal of Financial Planning;Jan/Feb2009 Practice Management, p24
Academic Journal
The article presents five questions financial planners should ask their information-technology professional regarding computer security. Software vendors frequently provide security updates, and planners need to know what the firm’s policy is for installing these. Inquire about whole-disk encryption programs for the firm’s laptop computers. Find out whether firewalls, anti-virus software, and other measures are in place to protect the company’s local area network. Ask what steps are taken to ensure that old data and hardware are being disposed of safely. Find out what practices might be adopted to ensure workplace safety.


Related Articles

  • Songs Of Separation. Devlin, Grem // Living Tradition;Feb/Mar2016, Issue 112, p59 

    No abstract available.

  • Six ways to limit your exposure to cyber attacks. Pierson, Christopher T. // Inside Tucson Business;1/24/2005, Vol. 14 Issue 33, Special section p1 

    This article focuses on cyber security. Businesses that store data in a digital format should have their security assessed by legal and information technology professionals. Using a firewall is much like closing and locking the doors to your home or office. Entry and exit are only allowed to...

  • KERIO WINROUTE FIREWALL 6.1 ADDS CLIENTLESS SSL-BASED VPN.  // Computer Security Update;Aug2005, p4 

    The article reports that Kerio Technologies Inc., a provider of Internet messaging and firewall solutions for small to medium- sized organizations, has announced that Kerio WinRoute Firewall 6.1, its flagship network security product, has added robust Clientless SSL-based VPN and transparent...

  • The New Law Firm Challenge: Confronting the Rise of Cyber Attacks and Preventing Enhanced Liability. Mandell, David; Schaffer, Karla // Law Practice Today;Mar2012, p10 

    The article discusses the importance for law firms to implement enhanced security measures for networks and servers to prevent cyber attacks and enhanced liability. To control access to the network based on a predetermined set of rules, the author emphasizes the absolute need for a firewall that...

  • SCS 2.0 beefs up desktop defense. Garcia, Andrew // eWeek;4/26/2004, Vol. 21 Issue 17, p58 

    With Symantic client Security 2.0, Symantec Corp. extends its desktop-based defenses against blended attacks by offering stalwart anti-virus protection, much-improved firewall and intrusion detection capabilities, and even a handy new adblocking engine. With SCS 2.0, IT administrators will find...

  • RECENT RELEASES.  // Information Security;Nov2005, Vol. 8 Issue 11, p73 

    Features several information security software and device released as of November 2005. Thunder 2.0 Security Event Manager software from Tenable Network Security; CounterPoint 2.2 network security appliance software from Mirage Network; PRO 4100 firewall from SonicWALL.

  • Securing your industrial control network. Schaffer, Dan // Plant Engineering;Nov2009, Vol. 63 Issue 11, pA15 

    The article offers tips for cyber security of industrial control networks in the U.S. It notes that control networks can be protected through the establishment of firewall, common security steps and the segmentation of control networks. It points out that the implementation of firewall...

  • HSBC warns of online banking bans. Goodwin, Bill // Computer Weekly;4/12/2005, p12 

    The article reports that banks may be forced to refuse customers access to online banking unless they can show they have adequate firewall and antivirus protection, HSBC has warned. Alan Jebson, group chief operating officer at HSBC, said banks could not continue to allow their customers to...

  • Attacks should not be a trigger. Bartlett, Jeannine // SC Magazine: For IT Security Professionals;Jan2005, p82 

    This article presents 4 ways to keep computer security policies up-to-date with the evolution of Web applications. First, add volatility metrics. Risk assessment is used to determine which assets to protect, typically by determining the relationship between the value of the information and its...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics