vigilance is the price of Wi-Fi

Smith, Brad
December 2002
Wireless Week;12/2/2002, Vol. 8 Issue 42, p34
Trade Publication
Gives advice on improving enterprise computer security. Problems with enterprise wireless computer networks; Security measures for networks; Advantage of the Advanced Encryption Standard in computer security.


Related Articles

  • Hiding in Plain Site. Schweitzer, Douglas; Hollis, Emily // Certification Magazine;Jan2005, Vol. 7 Issue 1, p36 

    This article presents information on several computer security tools for business enterprises released in the U.S. as of January 2005. Breaches of computer security cause direct financial losses to organizations worldwide. Fortunately, there are several tools that can be used to authenticate...

  • QUESTION OF IDENTITY. De Jongh, Tom // SC Magazine: For IT Security Professionals (UK Edition);Apr2006, Special section p9 

    The article deals with the need for businesses in Great Britain to secure and protect their data from unauthorized persons. Aside from hacking, there are many other security risks and methods of identity theft that threaten corporate sensitive data. Peer-to-peer sharing programs and copying data...

  • Computer Security.  // Futurist;Jul/Aug87, Vol. 21 Issue 4, p3 

    Reveals security threats to corporate data networks resulting from neglect of backup and safety provisions and failure to effectively use encryption.

  • Untitled. Ashford, Warwick // Computer Weekly;12/7/2010, p24 

    The article informs that the annual Enterprise Encryption Trends study in Great Britain has reported that data breaches continue to be a major concern around the world. The study found that 88% of organisations had at least one data breach in the past year and data protection is increasingly...

  • Companies Still Haven't Learnt the Lessons.  // Software World;May2009, Vol. 40 Issue 3, p18 

    The article reports on results for the data security survey of businesses, which were released in April 2009. Based on the survey, businesses still have not learnt valuable lessons from previous incidents about data security. It relates the incident of 2005 as well as in 2008, involving data...

  • Creating a Cyberdefense. Stuart, Anne; Mochari, Ilan // Inc.;Jan2002, Vol. 24 Issue 1, p90 

    Offers tips on protecting a company's computer systems. Priority of small businesses; Importance of having a firewall or shield between the company's internal systems and the Internet; Overview of making backup for all systems.

  • KEEPING AHEAD OF HACKERS. Franklin, Diane // Credit Union Management;Aug2001, Vol. 24 Issue 8, p31 

    Deals with computer security management. Details on the security tools of Digital Defense Inc.; Importance of regular vulnerability assessments; How to eliminate vulnerabilities of the system.

  • Protecting EDP systems from fifth-column attacks. Hawkins, David H. // Management Review;Oct72, Vol. 61 Issue 10, p51 

    Presents an article condensed from the June 1972 issue of the journal 'Computer Decisions,' about computer security for companies. Inclusion of the need for data processing managers to ensure that access to the computer system is controlled; Incorporation of security profiles with various...

  • SECURITY RED ALERT. Kosan, Lisa // eWeek;11/13/2000, Vol. 17 Issue 46, p139 

    Explores approaches which can be employed by business organizations to respond to computer network security alerts. Assessment of response to security breaches; Systematic way of dealing with the growing number of security alerts; Factors to consider when determining the appropriate response to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics