Data Security in a Tech-Crazed World

Nawrocki, Tom
July 2011
Journal of Financial Planning;Jul2011, Vol. 24 Issue 7, p20
Academic Journal
The article focuses on the solutions to allow financial advisers resolve their concerns over data security, compliance regulations and security breaches through the utilization of technology in the U.S. It notes that some advisers, particularly those with larger practices, considers cloud computing as the safest and most cost-effective move to local storage since it allows all files to be stored offsite. Also, it mentions that the growth of customer relationship management (CRM) systems is another component which has raised data security by encapsulating security factors in a single system while increasingly reducing the potential for the kind of breach or error.


Related Articles

  • How to deal with the aftermath of a breach. Raywood, Dan // Computer Weekly;1/26/2016, p25 

    The article offers suggestions for aftermath management of data breach in any company. Topics include the ability to detect a breach think defensively in identifying anomalous activity, the development of an incident response plan and employee training and the need to document and deliver...

  • Data Breaches Highlight the Importance of Privacy. Pierson, Christopher T. // Financial Executive;Mar2009, Vol. 25 Issue 2, p62 

    The article discusses data breaches and privacy. By one estimate the cost per record to financial services firms for each data breach in the U.S. during 2007 was $239. Over 245 million records have been accessed without authorization since 2005. Data breaches are the most common form of privacy...

  • Humiliated government sets out to mend its data ways. Williams, Peter // Information World Review;Jul/Aug2008, Issue 248, p01 

    The article reports on the response of the government of Great Britain to failings on data protection, particularly the loss of child benefit data discs by Her Majesty's Revenue and Customs and a report by the Independent Police Complaints Commission. Chancellor Alistair Darling made a statement...

  • Mass. security breach can affect N.H. firms. Funk, W. John; Dietel, Robert J. // New Hampshire Business Review;2/26/2010, Vol. 32 Issue 4, p26 

    The article focuses on the pre and post-breach standards created in Massachusetts which provides notification on the security breach or unauthorized acquisition of personal information of the state's residents. It mentions that the standards are imposed across the boundaries of the state and...

  • Cybersecurity in the Private Sector. ETZIONI, AMITAI // Issues in Science & Technology;Fall2011, Vol. 28 Issue 1, p58 

    The article looks at the issues related to cyber-security in private sector in the U.S. It is mentioned that the current incentives for corporations to better secure their computer systems are not aligned in a way to promote voluntarily actions and no major public funds have been made available....

  • Academics should not remain silent on hacking. Arthur, Charles // Nature;12/19/2013, Vol. 504 Issue 7480, p333 

    In this article, the author reflects on cryptography and the need of academia to create proper defense against cryptographic threats. He discusses the strength of encryption standards such as that used by the U. S. National Institute of Standards and Technology. He mentions that Matthew Green of...

  • Bad on Paper. Wolfe, Daniel; Wade, Will // American Banker;12/16/2009, Vol. 174 Issue 223, p5 

    The article reports that the nonprofit organization Identity Theft Resource Center estimates that 27 percent of all data security breaches in 2009 in the U.S. were created by the theft of paper documents, a large increase over 2008. The group believes that the recession has caused failed...

  • Schoolboy errors must end. Tebbatt, Philip // Lending Strategy;Jul/Aug2008, p21 

    The author focuses on the security risks associated with sending routine letters with important information to consumers. Among the companies who were penalized for data security breaches were Nationwide and the Merchant Securities. Publicly available data were used by fraudsters in order to...

  • Insiders. Wolfe, Daniel // American Banker;7/23/2008, Vol. 173 Issue 141, p5 

    The article offers security news briefs. Terry Childs is accused of hijacking access to a major San Francisco government computer network. The Web site "Wired.com" reports that the San Francisco incident is comparably minor. William G. Sullivan was sentenced to 57 months in prison for reselling...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics