CyberCrisis: Whose Job Is It, Anyway?

McCourt, Mark
February 2011
Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p10
Trade Publication
The article offers the author's insights on cybercrimes and cyber security in organizations. The author mentions the Security 500 Report that identified that only 20% of respondents administered cyber security for their organizations, indicating that 80% of organizations do not view cybercrime as a risk. He states that the increase in cyber related crimes is noted in the daily news of U.S. Overseas Security Advisory Council (OSAC). He believes that cybercrime requires thorough analysis.


Related Articles

  • Data Protection Control with Security Providers not Organizations. Krishnamurthy, Sathvik // Siliconindia;Jan2010, Vol. 13 Issue 1, p18 

    The article discusses the role by security providers in protecting data in the U.S. It states that with organizations determining the need to lessen risks with data breaches and lower the total costs for data protection, great opportunity is given to new and existing security providers....

  • The Key to Battling Cyber-Crime Begins With Users. Greengard, Samuel // CIO Insight;8/18/2015, p2 

    The article discusses how businesses can prevent cyber-crimes. It suggests to educate consumers and employees about proper cyber-security precautions. A survey showed the vulnerability of personal information of Americans. Businesses are advised to use encryption, virtualization and enterprise...

  • Are You Protected Against Cyber Theft? LEVIN, MICHAEL // BusinessWest;2/24/2014, Vol. 30 Issue 18, p22 

    The article focuses on the importance of cyber risk management and discusses the role of cyber-liability insurance in minimizing cyber risks. Topics discussed include the need to develop an incidence-response plan by businesses, expenses linked with data breaches and the development of a...

  • DON'T LET YOUR SECRETS OUT. Garrett, Alexander // Management Today;Apr2001, p92 

    Offers security tips for companies. Protection of business secrets; Computer network security; Classification of confidential files.

  • Pentagon Aims For Faster Deployment of New Cyber Tech. Malenic, Marina // Defense Daily;10/21/2010, Vol. 248 Issue 14, p7 

    The article reports that the U.S. Department of Defense (DoD) wants to reduce the development and deployment timeline for new network protective technology and hold up ties with its cyber security defense industrial base in lieu of the growing cyber threats. According to Robert Butler, deputy...

  • THE USUAL SUSPECTS. Kavanagh, John // Computer Weekly;8/8/2006, p35 

    The article focuses on disaster recovery in business enterprises. According to a research by disaster recovery systems specialist SteelEye Technology Inc., software maintenance and network failure are most likely causes of business interruption rather than terrorism, natural disaster and...

  • security: Firms warned of stealth virus risk. Goodwin, Bill // Computer Weekly;1/31/2006, p21 

    The article informs that different businesses are at risk from a new generation of targeted stealth viruses as organized criminal groups exploit weaknesses in corporate systems to steal sensitive data for profit. The viruses spread in small numbers to avoid detection, distribute through...

  • The Enemy Within.  // Manager: British Journal of Administrative Management;Jan/Feb2001, Issue 23, p7 

    Reports the publication of 'The Enemy Within' booklet by Vogon International for the protection of businesses against computer-based fraud. Minimization of computer-based fraud; Background on the company; Efforts of the company to detect fraud, software theft and breach of copyright.

  • The other side of competitive vigilance. Lipman, Ira A. // Advanced Management Journal (03621863);Winter82, Vol. 47 Issue 1, p4 

    Offers an advice on protecting vital company documents from careless or corruptible employees, theft by outsiders, and natural disaster. Definition of trade secret; Consideration of the nature of the material being safeguarded and the location of the security site; Prevalence of computer crime.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics