Site Map - How-to

New in Plaintext

- Dan Sullivan, an author and security expert, has penned a comprehensive text that will help readers better understand how these losses occur and how to prevent them. The Definitive Guide to Information Theft Prevention is an eight-chapter e-book available for free (the e-book is sponsored by Permeo Technologies, a provider of secure remote-access solutions)

Religion at Work

- Ten tips for avoiding discrimination lawsuits arising from religious accommodation requests at work.

A Practical Guide to Security Assessments

- Organizations do not function in a vacuum. They must balance and navigate business processes and interdependencies, the Internet, distributed systems, and legislation and regulation, just to name a few factors that influence their environment and posture.

Quick Bytes: Antifraud Measures

- Credit card fraudsters are costing the economy billions of dollars each year. Merchants can minimize those losses by taking preventive measures, such as comparing IP addresses to ascertain the distance between the person ordering the goods and the billing address of the online buyer, noting whether a free e-mail address was used, and checking for the use of anonymous proxy servers. A paper from FraudLabs, which offers antifraud services for online merchants, outlines more measures.  @ 10 Measures to Reduce Credit Card Fraud for Internet Merchants is at SM Online.

Go Phish

- There are seven steps in a phishing attack, from preparation through successful infection of a victim to the fraud committed using stolen information. Fortunately, there are countermeasures available for each stage. For example, organizations should monitor call volumes and the type of questions customers are asking; a large number of calls regarding password problems can signal a phishing attack. To interfere with the use of compromised information, organizations can use two-factor authentication devices such as biometrics. Instituting delays in some types of money transfers can provide time to detect and void phishing-based transactions.  @ Online identity theft: phishing technology, checkpoints and countermeasures, from the identity theft technology council,is at SM Online.

New in Plain Text


Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

New In PlainText

- The CISO Handbook: A Practical Guide To Securing Your Company is written by several Certified Information Systems Security Professionals who have set out to write the ultimate information officer’s handbook.

Security Offensive

- A new guide from the National Institute of Standards and Technology explains the key threats to, and recommends guidance for, securing industrial control systems.

Worth a Look

- USB drives have been born again, thanks to a new technology platform.

New In PlainText

- A guide to hacking defenses is reviewed.

Scientific Examination of Documents: Methods and Techniques, Third Edition

- A stable of trained and experienced specialists exists in the security profession to assist in duties that fall outside the knowledge of most security managers. One of those specialties is examination of documents, the topic of this book.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.