CyberCrisis: Whose Job Is It, Anyway?
- Data Protection Control with Security Providers not Organizations. Krishnamurthy, Sathvik // Siliconindia;Jan2010, Vol. 13 Issue 1, p18
The article discusses the role by security providers in protecting data in the U.S. It states that with organizations determining the need to lessen risks with data breaches and lower the total costs for data protection, great opportunity is given to new and existing security providers....
- The Key to Battling Cyber-Crime Begins With Users. Greengard, Samuel // CIO Insight;8/18/2015, p2
The article discusses how businesses can prevent cyber-crimes. It suggests to educate consumers and employees about proper cyber-security precautions. A survey showed the vulnerability of personal information of Americans. Businesses are advised to use encryption, virtualization and enterprise...
- Are You Protected Against Cyber Theft? LEVIN, MICHAEL // BusinessWest;2/24/2014, Vol. 30 Issue 18, p22
The article focuses on the importance of cyber risk management and discusses the role of cyber-liability insurance in minimizing cyber risks. Topics discussed include the need to develop an incidence-response plan by businesses, expenses linked with data breaches and the development of a...
- DON'T LET YOUR SECRETS OUT. Garrett, Alexander // Management Today;Apr2001, p92
Offers security tips for companies. Protection of business secrets; Computer network security; Classification of confidential files.
- Pentagon Aims For Faster Deployment of New Cyber Tech. Malenic, Marina // Defense Daily;10/21/2010, Vol. 248 Issue 14, p7
The article reports that the U.S. Department of Defense (DoD) wants to reduce the development and deployment timeline for new network protective technology and hold up ties with its cyber security defense industrial base in lieu of the growing cyber threats. According to Robert Butler, deputy...
- THE USUAL SUSPECTS. Kavanagh, John // Computer Weekly;8/8/2006, p35
The article focuses on disaster recovery in business enterprises. According to a research by disaster recovery systems specialist SteelEye Technology Inc., software maintenance and network failure are most likely causes of business interruption rather than terrorism, natural disaster and...
- security: Firms warned of stealth virus risk. Goodwin, Bill // Computer Weekly;1/31/2006, p21
The article informs that different businesses are at risk from a new generation of targeted stealth viruses as organized criminal groups exploit weaknesses in corporate systems to steal sensitive data for profit. The viruses spread in small numbers to avoid detection, distribute through...
- The Enemy Within. // Manager: British Journal of Administrative Management;Jan/Feb2001, Issue 23, p7
Reports the publication of 'The Enemy Within' booklet by Vogon International for the protection of businesses against computer-based fraud. Minimization of computer-based fraud; Background on the company; Efforts of the company to detect fraud, software theft and breach of copyright.
- The other side of competitive vigilance. Lipman, Ira A. // Advanced Management Journal (03621863);Winter82, Vol. 47 Issue 1, p4
Offers an advice on protecting vital company documents from careless or corruptible employees, theft by outsiders, and natural disaster. Definition of trade secret; Consideration of the nature of the material being safeguarded and the location of the security site; Prevalence of computer crime.