How secure is your data?

Greengard, Samuel
May 1998
Workforce (10928332);May98, Vol. 77 Issue 5, p52
Focuses on the security of a corporate's computer data. Percentage of companies that have suffered financial losses from computer security breaches according to a survey from the Computer Security Institute of San Francisco, California; Implications of computer security breaches to human resources management; Ways to prevent security breaches. INSETS: 5 ways to ensure employees keep data secure;Lose any data?;Play it safe.


Related Articles

  • Critical junctures. Guy, Sandra // Telephony;05/25/98, Vol. 234 Issue 21, p5 

    Emphasizes the importance of ensuring security in electronic data transmission. Vulnerability of computer-controlled satellites to hackers; Impact of the Galaxy IV satellite failure on paging systems and online communication.

  • 13 major banks to use encryption in Chicago data interchange service. Epper, Karen // American Banker;6/14/1994, Vol. 159 Issue 113, p15 

    Reports on major banks' use of electronic data encryption hardware to transmit data safely between their corporate customers and other financial institutions. Encoding of the payment and remittance data; Transmission of the payment and remittance of data to bank vendors and suppliers;...

  • EHR Systems Raise Concerns About Patient Safety.  // O&P Business News;Aug2014, Vol. 23 Issue 9, p38 

    The article discusses research by DW Meeks published in the "Journal of the American Medical Informatics Association" on patient safety concerns regarding the use of electronic health records (EHR). The safety concerns raised by patients include unsafe technology, unsafe use of technology,...

  • Interdisciplinary investigation of the authenticity and long-term preservation of electronic records. Katuu, S. // South African Journal of Information Management;Jun2006, Vol. 8 Issue 2, p3 

    The article focuses on the growing demand of safeguarding electronic data and finding out means to achieve this stupendous task. It is becoming a common concern for archivists, historians, scholars in computer science, engineering and other social sciences. One successful operation in research...

  • Microsoft Addresses Governments' Concerns Over Cloud OS Network. Hernandez, Pedro // eWeek;2/6/2014, p4 

    The article reports that computer company Microsoft Corp. is assuring the world's governments that its Cloud OS Network can keep their data safe and out of the hands of foreign concerns. Microsoft described the Cloud OS Network as a global consortium of over 25 cloud service providers. Dan...

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics