TITLE

Top 10 Data Security Trends For 2011

PUB. DATE
February 2011
SOURCE
Credit Union Journal;2/7/2011, Vol. 15 Issue 6, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the top 10 Data Security Trends for 2011 as reported by Kroll Inc. The trends include more small-scale breaches, stealing of data and 'low-tech' theft, and increased social networking policies for organization. It adds that financial organizations will continue to rely on portable devices but data-theft and data minimization will dominate the markets.
ACCESSION #
58094100

 

Related Articles

  • DATA-BREACH RISKS RISE WITH SOCIAL NETWORKING, MOBILE-PAYMENT APP USE.  // ISO & Agent Weekly;5/20/2010, Vol. 6 Issue 18, p9 

    The article reports on the results of the survey conducted by Consumer Reports on the rise of data-breach cases attributed to the rise of social networking and mobile payment application use in the U.S.

  • Rules of shtoom. Hall, Susan // Lawyer;3/17/2008, Vol. 22 Issue 11, p35 

    The article focuses on the problem concerning the increased risk of data security breaches in North West England. The public and private sectors are feeling the pressure from the Information Commissioner, who is actively engaged in trying to secure custodial sentences for serious breaches of the...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Dec2011, Vol. 22 Issue 12, p10 

    Statistics are presented on foreign attacks in the U.S. information security industry including the decline in phishing volume, the number of spam-support Internet support providers (ISPs), and the number of data security breaches.

  • Data Breaches Highlight the Importance of Privacy. Pierson, Christopher T. // Financial Executive;Mar2009, Vol. 25 Issue 2, p62 

    The article discusses data breaches and privacy. By one estimate the cost per record to financial services firms for each data breach in the U.S. during 2007 was $239. Over 245 million records have been accessed without authorization since 2005. Data breaches are the most common form of privacy...

  • Determining Trust Factors of Social Networking Sites. Veerasamy, Namosha; Labuschagne, William Aubrey // Proceedings of the European Conference on Information Warfare & ;2013, p288 

    Social networking sites have become part of everyday use with many users posting updates of their status as well as establishing contacts. While many users use social networking sites to connect and maintain contact, attackers may see social networks as a prime target for spreading malware,...

  • Social Media Policy Awareness Is Critical.  // Credit Union Directors Newsletter;Sep2012, Vol. 38 Issue 9, p4 

    The article discusses the need of creating awareness among the employees on social media policies (SMP). It states that SMPs are very critical to manage risks as these may expose the confidential information of company and also there is a need for data security. It suggests that credit unions...

  • Social media can be good for business, but only if you own it. Heinze, Carolyn // AV Technology;Sep2011, Vol. 4 Issue 8, p20 

    The article focuses on the use of social networking sites by enterprises for communication with the employees. The article further states that the emergence of the enterprise class social networking sites would help change the way of communication within an organization. The article also states...

  • What was the last thing you said SORRY FOR?  // Dolly;Apr2011, Issue 484, p58 

    The article features several teenage boys and shares some information on things that they are sorry for. One boy says he apologized for forgetting his friend's birthday. A guy claims he said sorry for breaking a girl's heart. Another guy reveals that he was sorry for a friend because her...

  • Untitled. Flinders, Karl // Computer Weekly;12/15/2009, p73 

    The article focuses on various challenges chief information officers (CIOs) may face in 2010. It informs that the main issue will be to prevent the loss or theft of confidential customer data by using technologies such as information rights management software, which make data impossible to read...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics