TITLE

Protecting Guest Data

AUTHOR(S)
O'Dell, Cait
PUB. DATE
October 2011
SOURCE
Hospitality Upgrade;Fall2011, p144
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article explores the significance of data protection as a proactive approach to business security. It notes that business have using such approach following the growth of computer hacking and other related cybercrimes. It suggests that data protection includes vulnerability scanning, one of the most important preventive measures to ensure top security. It also discusses the use of penetration tests and compare its differences with vulnerability scanning.
ACCESSION #
67378767

 

Related Articles

  • FEATURE: FIREWALLS. Winter, Daniel // Australian PC User;Oct2005, Vol. 17 Issue 10, p45 

    Evaluates the software firewall Kaspersky Anti-Hacker, part of Kaspersky's Personal Security Suite. Features of the software; Advantages of Kaspersky Anti-Hacker over other software; Weaknesses of the product.

  • Feature Analysis: Security concerns are the biggest barrier to enterprise mobility deployments.  // MarketWatch: Telecoms;Jul2008, Vol. 7 Issue 7, p5 

    The article discusses the issues concerning data security problems that mobile device enterprise have encountered. The author relates that employees integration of the corporate applications pose a threat to the security of their data. Furthermore, the author suggests that information technology...

  • Security as an Ethical Responsibility. Pfohl, Bill // Communique (0164775X);2011, Vol. 39 Issue 5, p36 

    The article offers tips for school psychologists in keeping school data safe. It notes the importance of knowing the people who have direct access to school psychologist's computer. It suggests the need to have a password for computer accounts for good protection. It also recommends the updation...

  • Online Banking Adoption Stymied By Security Fears. Tubin, George // Point for Credit Union Research & Advice;6/16/2003, pN.PAG 

    Presents the results of a consumer-level research conducted by TowerGroup in 2002 on computer security measures and policies. Consumer perception on electronic security; Reason behind the mass adoption of Internet banking; Responsibilities of banks and credit unions.

  • LiveVault Dovetails with Microsoft's Data-Protection Strategy. Grubb, Anne // Windows IT Pro;Dec2004, Vol. 10 Issue 14, p14 

    Reports on the release of LiveVault Corp.'s service that will complement Microsoft's Data Protection Server (DPS). Benefits of the combined security systems for enterprises; Plan of Microsoft to make LiveVault's AutoOffsite available in beta to coincide with the DPS release; Features of the...

  • FEATURE: ANTIVIRUS. Winter, Daniel // Australian PC User;Oct2005, Vol. 17 Issue 10, p42 

    Evaluates the antivirus software F-Secure Anti-Virus 2005 produced by Opensystems. Benefits of the software to the user; Functions of the software; Disadvantage of the software.

  • Dangerous Devices. Rostern, John // Internal Auditor;Oct2005, Vol. 62 Issue 5, p29 

    Assesses the threat posed by the huge storage capacity of computer-removable media to sensitive corporate data. Average annual damages from information security incidents in 2005; Results of a survey on information technology conducted by IT Security.com in 2004; Recommendations for managing...

  • Replicas. Bertrand, Christophe // ITNOW;Mar2006, Vol. 48 Issue 2, p16 

    Looks at the way to ensure the security of data in the event of a disruption to mission critical applications. Key factor to the management and security of data; Way to quantify the impact of disruption on the business; Methods of data protection.

  • New Navy Organization Taking On Cyber Defense Acquisition. Fein, Geoff // Defense Daily;8/31/2010, Vol. 247 Issue 43, p4 

    The article reports on the plan of the U.S. Navy to buy Cyber Defense technologies to protect its networks, particularly those aboard ships. It mentions that the move is to strengthen the tools and capabilities cyber warfighters need to protect the data and networks from various cyber threats....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics