Why Superphone Hacks Are Your Business

McCourt, Mark
March 2011
Security: Solutions for Enterprise Security Leaders;Mar2011, Vol. 48 Issue 3, p10
Trade Publication
The article offers insights on the security threats of using superphones such as iPad and post-iPad tablets in the U.S. It mentions that the root of the fraud is not information technology (IT) issue, but rather a corporate security which include culture, training and policies by employees to ensure the risk is reduced. It notes that threats include spying to gain access to passwords to corporate networks as well as personal banking account.


Related Articles

  • Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk? Baskerville, Richard L. // Cutter Benchmark Review;Dec2005, Vol. 5 Issue 12, p5 

    The article discusses the practices employed in information technology risk management by modern business organizations. Specific security safeguard approaches including economic rationality, adoption of security standards and a comprehensive risk management program were adopted to counteract...

  • Mobile communications: business enabler or corporate risk? Successful, risk-free exploitation of mobile technologies requires real cooperation between IT and the business to develop the right security policies. Wiltshire, Craig // IM@T.Online;Nov2007, p10 

    The article focuses on the need for the information technology sector and business enterprises to develop appropriate security policies. The need was attributed to risks of data theft and disruption caused by mobile technologies in corporate networks. One of the potential solutions cited is the...

  • THE ULTIMATE BALANCING ACT. Armstrong, Illena // SC Magazine: For IT Security Professionals (UK Edition);Jul2005, p30 

    This article discusses the adoption by organizations of risk-management (RM) practices in 2005 to align security processes and deployments with business needs. Having a core definition of risk is the first step to devising an enterprise-wide risk strategy. Understanding what risk means to the...

  • Using COBIT to Manage the Benefits, Risks and Security of Outsourcing Cloud Computing. Ahmed, Adesanya // COBIT Focus;2011, Vol. 2011 Issue 2, p13 

    The article reports on the use of COBIT information technology (IT) resource tool in managing financial activities and providing security on outsourcing cloud computer from any form of risks. It notes that there is a need for every business enterprise to reconstitute their business in the use of...

  • A Game Worth Playing. Piccoli, Gabriele // Cutter Benchmark Review;Dec2005, Vol. 5 Issue 12, p20 

    The article discusses the development of information technology (IT) security in the U. S. First is the technological development and software programs that guides certain set of security and risk management challenges. Another is the issue of regulation in response to growth of computer system...

  • Standardization of all Information Security Management Systems. Rezakhani, Afshin // International Journal of Computer Applications;Mar2011, Vol. 18, p4 

    Information security relates to the protection of Information Technology assets against the risks of loss, misuse, disclosure or damage. Information security management system (ISMS) is controls that organizations need to implement to ensure that it is sensibly managing these risks. In the other...

  • Contemplating Cyber Risk. Burkett, Paul A. // Resources Magazine;Winter2010, p4 

    The article discusses the significance of implementing a comprehensive cyber risk management system for business enterprises that will enhance the company's software, application, data and information security. It relays that cyber risks management has developed into a process that requires the...

  • Balance the right level of security with the needs of your end-users. Laidlaw, Robin // Computer Weekly;4/6/2004, p24 

    The balance of security and risk is an issue that affects every aspect of our day-to-day lives. To be absolutely secure means a shut-down, whether that is road travel, allowing people to swim in the sea, having an operation or developing an information technology (IT) system. However, in...

  • CISOs Closer to Board. Hulme, George V. // Information Security;Mar2006, Vol. 9 Issue 3, p18 

    Reports on the career trends pertaining to IT security managers and other IT professionals, as of March 2006. Trend toward increased risk management; Findings of the Global Information Security Workforce Study on the expectations of IT security professionals; Executive considered ultimately...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics