TITLE

How to Secure Client Data

AUTHOR(S)
Bhatnagar, Ash
PUB. DATE
November 2009
SOURCE
Journal of Financial Planning;Nov/Dec2009 Practice Management Sol, p24
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article presents the author's idea in safekeeping client's data against information breach from external parties. It notes several news that groups of genius hackers are on the move to steal and sell information which poses great risks among financial firms and advisers, compromising data security. It is suggested to deal security in a process perspective rather than a hacking perspective through policies and procedures implementation. Personal computers (PC), for example, are the first place of infiltration threats in which the author suggests the every PC should have an antivirus software with an automated update. Moreover, the level of protection begins in network security in which the author offers tips in setting up an on-line network.
ACCESSION #
46812679

 

Related Articles

  • Software Patches More Vulnerable to Hackers. Marshall, Jeffrey; Heffes, Ellen M. // Financial Executive;Mar2005, Vol. 21 Issue 2, p10 

    The article presents information about computer security measures. Experts say software patches used to update source code or alter it to subvert hackers are becoming more vulnerable. They estimate that by 2006, 30% of all cyber attacks will target vulnerabilities where a patch has been...

  • Health Data Breach Impacts Nearly All Montana Residents. Goedert, Joseph // Healthdatamanagement.com;6/26/2014, p3 

    The article reports on the notification from Montana state officials to residents related to health data breach after the Department of Public Health and Human Services' computer server was hacked.

  • Spotlight on Sony. Quittner, Jeremy // American Banker;6/8/2011, Vol. 176 Issue 88, p5 

    The article reports the hacker group Lulz Security is releasing personal data stored by Sony Corp., which experienced a security breach in May 2010, on Sony Pictures Entertainment Inc.'s servers.

  • TEMPTING TARGET. WEISS, SUZANNE // State Legislatures;Jun2011, Vol. 37 Issue 6, p30 

    The article focuses on attacks on state government information systems in the U.S. It cites the cyber attack of the Virginia information system when hackers demanded a 10 million U.S. dollars ransom for return of patient records on April 30, 2009. It discusses the vulnerabilities of state...

  • Information Security--A Critical Business Function. Smith, Robert // Journal of GXP Compliance;Autumn2009, Vol. 13 Issue 4, p62 

    The article describes a hypothetical case of breach of computer security which shows how easily a corporate computer system may be accessed, both by unauthorized internal personnel and by an outside hacker. The situation involved a pharmaceutical biotechnology company, an employee who wanted to...

  • Are Your Emails Safe? Crookes, David // Micro Mart;5/21/2015, Issue 1363, p8 

    The article focuses on the lax security of email accounts, along with tips on protecting them from hackers. Topics covered include the over reliance on anti-virus software which cannot protect emails against zero-day attacks or system threats, the importance of securing email accounts adequately...

  • Managing data privacy issues in commercial and M&A transactions. Franken, Jessica; Buchta, Heather // Inside Counsel (SyndiGate Media Inc.);8/6/2015, p1 

    The article discusses aspects of privacy and security in business from the risks of data breaches and hackers who are becoming sophisticated in the technological change. It highlights the need to understand the data being collected and how it is used to ensure proper data management and...

  • Outsourcing Information Security: Contracting Issues and Security Implications. Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan // Management Science;Mar2014, Vol. 60 Issue 3, p638 

    A unique challenge in information security outsourcing is that neither the outsourcing firm nor the managed security service provider (MSSP) perfectly observes the outcome, the occurrence of a security breach, of prevention effort. Detection of security breaches often requires specialized...

  • SOUND THE ALARM. Chichowski, Ericka // Entrepreneur;Jun2010, Vol. 38 Issue 6, p54 

    The article discusses an increase which has been seen in the number of small businesses that have become victims of computer crimes including data theft. A discussion of several methods that computer criminals can use to gain access to a small business' computer, and of the large financial gains...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics