Increase your data police force

Kirkby, Andrea
September 2002
Cabinet Maker;9/20/2002, Issue 5305, p9
Trade Publication
Discusses the need for companies to make sure that their computer systems are safe from security breaches by staff. Inclusion of the implementation of an e-mail policy; Use of social engineering to access data; Ways in which laptop computers are a particular source of risk; Risks presented by e-mail attachments and mailing lists.


Related Articles

  • The danger within. Radcliff, Deborah // InfoWorld;04/20/98, Vol. 20 Issue 16, p95 

    Looks at how the security of a company's computer systems can be compromised by disgruntled employees. Details about a disgruntled Omega Engineering employee's placement of a logic bomb on the company's network; Other insider threats to information systems; Corporate espionage; Social...

  • Whitehall needs to face up to infosec. Ilett, Dan // SC Magazine: For IT Security Professionals;May2004, p15 

    This article deals with the reprimand of government employees in Great Britain for inappropriate computer usage. Security breaches committed include unauthorized computer access, dishonest data manipulation and viewing inappropriate material. The Liberal Democrats, who gathered the information...

  • ECRYPT INC. WARNS ABOUT HIGH COSTS OF CORP. ESPIONAGE.  // Computer Security Update;Jan2011, Vol. 12 Issue 1, p3 

    The article reports on the announcement from the information security firm eCrypt Inc. that businesses, who use encryption as protection for themselves, are still vulnerable to external attacks, targeting the most intimate access to sensitive data. It mentions that the spending for encryption...

  • Identifying Corporate Fraud Can Help Your Bottom Line. Taylor, Patrick // Database Trends & Applications;Jan2005, Vol. 19 Issue 1, p17 

    This article explains that computer fraud schemes perpetrated by insiders in corporations include: "ghost" vendors who invoice the organization; ghost employees on the payroll; accounts payable tampering to redirect payments; fabricated commissions; and fictitious invoices, refunds, or expense...

  • Big Brother Tech Delivers Better Security, Awareness. Jepson, Kevin // Credit Union Journal;5/21/2007, Vol. 11 Issue 20, p1 

    The article describes the internal, physical, and computer security measures at U.S. credit unions that are intended to protect electronic information resources against employee crimes. Technologies include Universal Serial Bus security, data encryption platforms, and electronic mail system...

  • WORKPLACE RIGHTS: UNPLUG MP3 THIEVES. Burd, Michael; Davies, James // Management Today;Oct2005, p15 

    The article focuses on the dangers of using iPods and other similar devices at workplaces. They can be plugged into a PC and used to copy data, often bypassing firewalls or password protection. Disaffected employees might therefore use such MP3s to download stacks of their employer's...

  • Staff are biggest threat to security, conference told. Richards, Justin // Computer Weekly;5/16/2006, p58 

    The article reports that delegates at Information Security Specialist Group Conference organized by the British Computer Society in May 2006 were told that the biggest IT security threat in most organizations comes from employees. Employee misdemeanors include hostile defections, theft of...

  • The Threat from Within. Patel, Manoj // Risk Management (00355593);Jun2009, Vol. 56 Issue 5, p8 

    This article discusses the threat of data security issues and information theft following the dismissal of employees. Research by the company Unity Solutions LLC into the management of data security risks is considered. Incidents where disgruntled employees such as Biswahoman Pani, a former...

  • Workers pressured to ignore violations.  // USA Today Magazine;Aug95, Vol. 124 Issue 2603, p4 

    Presents results of the `1994 Employee Survey on Ethics in American Business: Policies, Programs and Perceptions,' conducted by the Ethics Resource Center in Washington, D.C. Pressure felt by workers from management to enter in certain amount of misconduct; Common types of transgression; Reasons...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics