TITLE

Corporate Data Up For Grabs

AUTHOR(S)
Wickham, Rhonda
PUB. DATE
September 2004
SOURCE
Wireless Week;9/1/2004, Vol. 10 Issue 18, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
Presents views on security of corporate information in wireless devices used for business enterprises. Percentage of U.S. companies which reported breaches of their information technology and computational systems according to a 2003 computer crime and security survey conducted by the Computer Security Institute and the U.S. Federal Bureau of Investigation; Tips for companies on using encryption program for their corporate data from Peter Larsson, CEO of Pointsec Mobile Technologies.
ACCESSION #
14304559

 

Related Articles

  • Cybercrime Trends. Wolfe, Daniel // American Banker;8/20/2008, Vol. 173 Issue 161, p5 

    The article discusses separate ways in which businesses and the U.S. government choose to deal with cyber crimes. Examining statements from head of he U.S. Federal Bureau of Investigation (FBI) James Finch in the "Washington Post," the article examines how businesses are less likely to use the...

  • WHY information security is everybody's business. Jackson, Donovan // New Zealand Management;Dec2014/Jan2015, Vol. 61 Issue 5, p18 

    The article discusses reasons behind the need for everybody to be involved in information security. Topics discussed include the complexity of information technology (IT) in the 21st century, as well as the evolving nature of cyber risks, the role to be played by the chief executive officer on...

  • Threat Report.  // SC Magazine: For IT Security Professionals (15476693);Aug2010, Vol. 21 Issue 8, p8 

    The article presents updates on international hacking and information technology security. The encryption from hard drives taken from Daniel Dantas, a banker accused of financial crimes in Brazil, was not decrypted by the U.S. Federal Bureau of Investigation (FBI). According to the Dutch...

  • Untitled. Ashford, Warwick // Computer Weekly;12/7/2010, p24 

    The article informs that the annual Enterprise Encryption Trends study in Great Britain has reported that data breaches continue to be a major concern around the world. The study found that 88% of organisations had at least one data breach in the past year and data protection is increasingly...

  • vigilance is the price of Wi-Fi. Smith, Brad // Wireless Week;12/2/2002, Vol. 8 Issue 42, p34 

    Gives advice on improving enterprise computer security. Problems with enterprise wireless computer networks; Security measures for networks; Advantage of the Advanced Encryption Standard in computer security.

  • Computer Security.  // Futurist;Jul/Aug87, Vol. 21 Issue 4, p3 

    Reveals security threats to corporate data networks resulting from neglect of backup and safety provisions and failure to effectively use encryption.

  • Hiding in Plain Site. Schweitzer, Douglas; Hollis, Emily // Certification Magazine;Jan2005, Vol. 7 Issue 1, p36 

    This article presents information on several computer security tools for business enterprises released in the U.S. as of January 2005. Breaches of computer security cause direct financial losses to organizations worldwide. Fortunately, there are several tools that can be used to authenticate...

  • Butterfingered mobile device users create further IT risk. Wexler, Joanie // Network World;2/21/2005, Vol. 22 Issue 7, p61 

    The article reports that the need for a structured approach to the management and security of mobile devices is escalating. Smartphone-style devices, in addition to supporting voice communications, are increasingly likely to store sensitive corporate data and intranet connections. They are most...

  • 'Net attacks to plague small and midsize firms. Legard, David // Network World;10/16/2000, Vol. 17 Issue 42, p108 

    Highlights the findings of a report on Internet security problems conducted by the market research firm Gartner Group. Prevalence of Internet attacks among firms that manage their own network security; Use of the Internet for non-electronic mail functions; Vulnerability of small and midsize firms.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics