Data Security Strategies to Protect Your Clients

Bhatnagar, Ash
March 2011
Journal of Financial Planning;Mar/Apr2011 Practice Management, p14
Academic Journal
The article focuses on the data security strategies that financial planners in the U.S. can implement to protect their clients. The author says that personal computer (PC) can be used by computer hackers to infiltrate the computer system. He suggests that financial planners should use a fingerprint reader and create a screen-saver time-out password. He mentions the developments made by most computer servers particularly in cloud computing. He notes that cloud computing is already equipped with important security features such as anti-virus software, firewalls and other installed security software. He prefers Firefox web browser because of the availability of free security features on its website.


Related Articles

  • Windows Server 2008 R2 Firewall Security. Sugano, Alan // Windows IT Pro;Dec2011, Vol. 17 Issue 12, p53 

    The article focuses on firewall security in Windows Server 2008 R2. With Microsoft Management Console (MMC) Firewall with Advanced Security snap-in, users can successfully keep their firewall enabled and still have the server work in a production environment. Besides the Firewall with Advanced...

  • Putting the Finishing Touches on Server Core. MINASI, MARK // Windows IT Pro;Oct2008, Vol. 14 Issue 10, p15 

    The article offers the finishing touches in getting a new Windows Server 2008 Server Core system which include a short command-line tips namely setting the system's time zone, configuring its screen saver and tweaking its firewall. In order to set a Server Core system's time zone, it starts by...

  • Is a personal firewall right for your computer? Altom, Tim // Indianapolis Business Journal;10/7/2002, Vol. 23 Issue 30, p54A 

    Discusses the use of firewall software in home computers to prevent virus attacks. Availability of personal firewalls for comparatively little money; Ways in which firewalls are not altogether effective; Certain personal firewalls' focus on barring determined incoming attacks; Prevention of...

  • Verizon Selects AMD's SeaMicro SM15000 for Enterprise Class Services: Verizon Cloud Compute and Verizon Cloud Storage.  // SAN/LAN;Oct2013, Vol. 31 Issue 10, p3 

    The article focuses on an announcement made by the semiconductor company Advanced Micro Devices that an American telecommunication company Verizon Communications will use its SeaMicro SM15000 servers for its new global cloud platform and cloud-based object storage service and benefits of server....

  • HP Builds New Converged Cloud Package Atop OpenStack. Preimesberger, Chris // eWeek;4/10/2012, p4 

    The article reports on the development and release of the Hewlett-Packard (HP) Converged Cloud package from HP Co. It states that the cloud package will run on an HP-supported version of open-source software, OpenStack, when it becomes available on May 10, 2012 in beta. It says that enterprises...

  • Managing your Linux server.  // APC (Bauer Media Group);Apr2008, Vol. 28 Issue 4, p98 

    The article offers tips on how to manage computer servers, computer networks and the server applications. During the installation of firewall, computer might prompt users to enable a kernel-based firewall after installation along with a few basic configuration options. One can reconfigure the...

  • How to segregate virtual servers. Cummings, Joanne // Network World;3/17/2008, Vol. 25 Issue 11, p40 

    The article offers information on how to segregate and protect virtual servers. According to the author, protecting virtual servers from each other requires a unique set of security mechanisms. When taking into account the prerequisites of a good server-to-server firewall, deploying security in...

  • Confused? You're Not Alone. Mimoso, Michael S. // Information Security;May2008, Vol. 11 Issue 4, p13 

    The article discusses Section 6.6 of the PCI Data Security Standard whose wordings have caused confusion. The guideline mandates that web applications be protected against attacks by either having custom code reviewed by a third party or an application layer firewall but it does not say whether...

  • PROTECTING CORPORATE NETWORKS to Avoid a Nightmare Scenario. Beierly, Ingrid // Hospitality Upgrade;Fall2012, p140 

    The article discusses several important steps companies can take to help mitigate against data security threats. It is recommended to use network segmentation to ensure the payment card processing environment is separate from public networks. Another is configuring the firewall to only allow...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics