To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are
- By John Livingston
- Jun 01, 2008
Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.
- By Bill Piwonka
- Jun 01, 2008
Secure Computing Corp. recently announced the results of an IT director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for emerging Web-based attacks.
A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an alarming “air of invincibility” when it comes to their companies’ potential exposure to a data breach
In its fifth-annual study of outbound e-mail and content security issues, Proofpoint Inc. found that large enterprises continue to incur risk from -- and take action against -- information leaks over outbound e-mail, as well as newer communications media such as blogs, message boards, media sharing sites and mobile devices.
Symark International recently announced the results of a survey of more than 850 security, IT, HR and C-level executives across all industries. Conducted by eMediaUSA, the survey focused on orphaned accounts -- user accounts that remain active after an employee has left a company -- and the processes organizations have in place to locate and terminate them.
In its Global Threat Report issued recently, ScanSafe reported a 35 percent increase in Web-based malware in April.
A new survey of IT professionals revealed that new regulatory compliance requirements -- for implementing satisfactory technology solutions to address security vulnerabilities, data leakage and compliance -- remain difficult for enterprise organizations to effectively achieve.
It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.
- By Steven Titch
- May 09, 2008
Network access control technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common misperceptions are dispelled and NAC gains acceptance as a key part of network security, these technologies become the center of a highly competitive and lucrative market.
Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?
- By Steve Laubenstein
- May 05, 2008
Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.
- By Daniel Ryan
- May 01, 2008
AirPatrol Corp. recently launched a cell phone detection and location solution to help businesses and governments protect against the unique threats posed by the use of cell phones for fraud, crime and interference with business operations.
Avoiding reputation damage to the organization was viewed as a top priority for security programs by three-quarters of information security professionals surveyed in a worldwide study launched recently by (ISC)².
According to a survey conducted at the HIMSS 2008 Annual Conference and Exhibition, 64 percent of respondents cited “access” as their number one IT security concern, highlighting the importance of controlling user access to clinical systems and applications in healthcare environments.
How’s this for a nightmare scenario? Stealthy bad hats sneak up on an IP video camera attached to a remote fence and unplug it from its Ethernet cable. In its place, they jack in a laptop computer and -- voila! -- they’re now inside that surveillance network where they can manipulate other cameras, reprogram door locks, fiddle with access credentials and perhaps wreak havoc all over the target organization’s intranet.
- By John W. Verity
- Apr 23, 2008
SanDisk Corp. recently announced the results of a new study demonstrating the risks of unsecured USB flash drive usage within enterprise organizations.
Recently at the RSA conference, the National Cyber Security Alliance (NCSA) announced study findings that 71 percent of consumers lack the knowledge on cyber criminals' weapon of choice and the Internet's fastest growing threat -- botnets.
As Americans do their taxes, a majority are unaware that they may be putting personal and financial information required on tax returns in jeopardy.
Despite most network security vendors establishing operations in Latin America in early 2000, the region started investing significantly in security solutions only since 2002. New research shows that the market earned revenues of $186.1 million in 2007 and estimates this to reach $598.4 million in 2013.