Lower spending poses information security risks

March 2009
Slovak Spectator;3/16/2009, Vol. 15 Issue 10, p6
No abstract available.


Related Articles

  • Top brass: We're too broke to go on beat. Martin Beckford // Mail on Sunday;9/27/2015, p18 

    POLICE chiefs have given a stark warning to Ministers that the next wave of massive spending cuts poses a 'considerable risk to national security', it can be revealed.

  • Minimizing New Risks the Old-Fashioned Way. Pironti, John // Wireless Week;4/1/2005, Vol. 11 Issue 8, p31 

    Focuses on the information security challenges posed by smartphones and personal digital assistants. Mobile device features that increase the risk of information leakage; Solutions that can minimize the risk posed by information accessibility.

  • Global State Of Energy Industry Information Security. Slocumb, Ray // Pipeline & Gas Journal;Feb2009, Vol. 236 Issue 2, p62 

    The article focuses on the impact brought by spending cuts in the U.S. According to the article, it will have a great effect on technology as well as the effort to strengthen information security at risk. it notes that issues concerning security continued to be the prime importance in the...

  • Under attack. Smith, Tristan // Smart Business Detroit;May2012, Vol. 8 Issue 4, p24 

    An interview with Tristan Smith, information technology manager at First State Bank, is presented. When asked about the steps businesses can take to lower their risk of a security breach, he presents tips to help any business to minimize their risk of security breach. Smith addresses the issue...

  • On Guard. Bender, Eric // Entrepreneur;Nov2003, Vol. 31 Issue 11, p62 

    Interviews Mark Lobel, senior manager in computer security services practice at PricewaterhouseCoopers. Setting the budget for information security; Security risks posed by increasing electronic connection and wireless networks; Employees' lack of security consciousness.

  • Cyberattacks Prompt Response to Security Threat. O'Rourke, Morgan // Risk Management (00355593);Jan2003, Vol. 50 Issue 1, p8 

    Reports on the release of a draft recommendations in securing cyberinfrastructure by the federal government in the U.S. Promotion of education and information sharing on security risks; Installation of security technology for companies and consumers; Allocation of federal spending for computer...

  • Cybersecurity professionals ere the new guardians of digital change: Gartner.  // Express Computer;10/13/2015, p1 

    The article informs that changes in digital devices and services continue to pose risk and security landscapes according to information technology firm Gartner which has pushed organizations to prepare for additional cybersecurity skills to ensure better protection and security.

  • Not Enough Resources Dedicated to Mobile App Security.  // Information Security;May2015, Vol. 17 Issue 4, p10 

    Several charts are presented that show results of the magazine survey indicating that not enough resources are dedicated to firms' mobile application (app) security, including high risk associated with mobile workforce, ripple effect on app security spending and mobile insecurity posing a threat.

  • A tale of two industries. Partyka, Paul // American Coin-Op (Crain Communications Inc. (MI));Jul2009, Vol. 50 Issue 7, p16 

    The article offers information on the cashless concept with regards to the car wash industry and self-service laundry industry in the U.S. The market research shows that the self-service laundry customers are divided over their spending preference. It is also mentioned that the laundries should...

  • CYBERTALK. Ducoffe, Phil // San Diego Business Journal;6/8/2015, Vol. 36 Issue 23, p8 

    The article focuses on the risks posed by mobile devices to enterprise data security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics