The changing face of data protection

Wood, Denise
December 2013
Sports Car;Dec2013, Vol. 24 Issue 12, p16
In this article, the author focuses on the changing aspects of business and consumer data protection. She informs that information technology (IT), sakes and customer services departments should know IT security policies and standards and she states that businesses should be aware of latest cyber security threats. She also mentions that business organizations should use third-party vendors for monitoring and secure coding.


Related Articles

  • Eliminate mobile app threats. Walsh, Jack // Sports Car;Dec2013, Vol. 24 Issue 12, p50 

    In this article, the author reflects on the need to eliminate mobile device applications threats in business organizations. He states that the technology research firm Gartner Inc. has predicted that 25 percent of enterprises will have a mobile enterprise application stores (EAS) by 2017. He...

  • A security tool with a message. Dix, John // Network World;5/14/2007, Vol. 24 Issue 19, p36 

    The article discusses the issue regarding the data leakage problem in an organization. According to the author, forwarding of information that violates policy or regulation by employees may put the company's computer security system at risk. An overview of Orchestria which addresses the...

  • CODE42 INTRODUCES PRIVATE-CLOUD FILE SHARING.  // Computer Security Update;Nov2014, Vol. 15 Issue 11, p7 

    The article reports on the introduction of endpoint data protection and management company Code42 of its fourth-generation endpoint data protection platform and an updated version of its SharePlan enterprise file sync and share solution. An overview of the platform is given, highlighting its...

  • The next big issue. Nicolle, Lindsay // Computer Bulletin;Nov1998, Vol. 40 Issue 6, p24 

    Amid the furious activity to prepare systems for 2000 and the euro another big issue is being neglected – and the first deadline has already just passed. Lindsay Nicolle gathers practical advice from the experts on preparing for the wide ranging new data protection laws

  • Back up the virtual machine. Heitmann, Richard // Communications News;Oct2007, Vol. 44 Issue 10, p30 

    The article focuses on the gap between developments in virtual technology and virtual data protection. The article explains that online companies have been developed in order to provide backup protection for the virtual data, which is a part of the software-as-a-service (SaaS) model. It offers...

  • ID Management Standards Ready for Users. Bills, Steve // American Banker;12/10/2007, Vol. 172 Issue 236, p22 

    The article reports that the Liberty Alliance Project, a coalition of 150 businesses and organizations for computer security issues, has completed its Identity Assurance Framework. It is a set of standards for technology which would allow a company to verify the identity of someone online, and...

  • Have a policy for employees covering business intelligence.  // Security: Solutions for Enterprise Security Leaders;Jun99, Vol. 36 Issue 6, p74 

    Emphasizes the importance for companies of establishing a policy on business intelligence security. Education of employees on forming information security habits; Likelihood of external and internal espionage; Checking of internal problem through spread of false information; Performance of...

  • Targeted cyber attacks top agenda. JONES, ROB // MEED: Middle East Economic Digest;1/14/2011, Vol. 55 Issue 2, p22 

    The article discusses issues related to cyber attacks on companies around the Middle East. It has been stated that security companies fear that highly targeted attacks will be prevalent in 2011. They think that many varieties of Stuxnet worm will be used for corporate espionage in 2011. Costin...

  • Toolunterstützung für qualitatives Threat Modeling von Embedded Systems in Kritischen Infrastrukturen. Hanh Quyen Nguyen // University of St. Gallen, Business Dissertations;10/26/2010, p1 

    Critical infrastructures are functional integrated collective automation systems and composed of software sensitive embedded systems. With the soaring interconnectedness of critical infrastructures these integrated digital information processing components have increasingly become the target of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics