TITLE

Dealers can't afford to ignore Web security

AUTHOR(S)
Cabadas, Joseph
PUB. DATE
December 2001
SOURCE
Automotive News;12/3/2001, Vol. 76 Issue 5960, p4T
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the reasons for automotive dealer not to ignore security over the information technology United States. Impact of hacking in the sales; Security guideline for dealers from Internet security experts; Recommendation of hiring an outsider to do risk assessment of security risks. INSET: Security tips..
ACCESSION #
5745358

 

Related Articles

  • What price security?  // Management Accounting: Magazine for Chartered Management Account;June97, Vol. 75 Issue 6, p60 

    Reports on the results of the Department of Trade and Industry's (DTI) 1996 Information Security Breaches Survey which reveals the belief of the majority of managing directors that their companies would collapse if their information technology (IT) systems did. Incidence of security breaches;...

  • Confidentiality and security in information technology.  // Generations;Fall97, Vol. 21 Issue 3, p50 

    Discusses ways to manage and protect confidential records in information technology. Challenge in online confidentiality; Provisions of the Electronic Communications Privacy Act of 1990; Significance of privacy and confidentiality to older adults.

  • MGT514: IT Security Strategic Planning, Policy and Leadership.  // SC Magazine: For IT Security Professionals (15476693);Apr2013 Sans Fire Supplement, p48 

    A description of the course "IT Security Strategic Planning, Policy and Leadership" being offered at SANSFIRE 2013 in Washington, D.C. is provided.

  • Insecure?  // PC Week;6/24/96, Vol. 13 Issue 25, pE4 

    Highlights the results of a survey which found that at lease 90 percent of central information officers are involved in making a final decision on the purchase of security products and services.

  • IT Security survey.  // Management Services;Feb1994, Vol. 38 Issue 2, p36 

    Presents the survey on information technology security (IT). Identification of the extent of security breaches experienced by the companies; Assessment of the effects of security breaches on business; Provision of measure of the costs of breaches; Awareness of IT security issues.

  • Channel News and Analysis: 2010: Sweeping Changes Coming for IT.  // Channel Insider;12/4/2009, p1 

    The article presents the expected changes in information technology (IT) in 2010 that are associated with modest recovery spending which include network security, data storage and health care IT.

  • CYBER SECURITY LAGGING. Parmalee, Patricia J. // Aviation Week & Space Technology;11/26/2001, Vol. 155 Issue 22, p21 

    Reports the vulnerability on cyber attacks of the information system among industries in the United States. Inference to the survey of the Computer Science Corp.; Need of the companies for security measure enhancements.

  • Information Technology Security Engagements. Nearon, Bruce H. // CPA Journal;Jul2000, Vol. 70 Issue 7, p28 

    Provides advice to certified public accountants who plan to add information technology (IT) security to the services they offer. Types of IT security engagements; Steps and components of IT security engagements; Qualities of the ideal IT security engagement letter; Objective of IT disaster...

  • Hackers hit 35% of UK companies. Goodwin, Bill // Computer Weekly;3/7/2002, p3 

    Reports the security problems of some information technology (IT) corporations on necessary company information in Great Britain. Refusal of IT managers to grant acces to the Web site for security reasons; Worry of small companies on the threats from own employees.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics