INFORMATION

Site Map - IT Security

Data Breaches

- This report examines the total cost to the bottom line of failing to protect customer data from loss or theft.

Behind the Numbers

-

Quick Bytes: Weak Passwords

- Do you use the same password for all the different sites you visit that require one? If you do, you’re in the majority, according to a poll of 100 people conducted by UPEK, a manufacturer of biometric products. Half of those who use the same password say that it is based on the name of their spouse, pet, hometown, or favorite baseball team—and it is never changed.  @ More from the UPEK survey, which also considers the public’s acceptance of using biometrics instead of passwords, is at SM Online.

69

-

DHS Improves Its Infosec

-

Arming the Road Warrior

- When employees travel on business, companies must ensure that their mobile computing does not put corporate data at risk.

The Price of Wireless Security

- A new survey finds companies will spend 10-20 percent more on security next year to protect their wireless networks and technology.

Does Cyberwar Violate Human Rights?

- Over at Reason, Michael Weiss has an intriguing argument in relation to the cyberattacks on Estonia this spring: Cyberwar violates human rights.

Behind the Numbers: A Surge in Phishing Attacks

-

A Site to See

- Machine agents such as robots or crawlers (called bots) visit millions of Web sites daily. Sometimes the use is benign, as when search agents use them to update their information. But these programs can also be harmful. They can be used to hunt for Web site vulnerabilities or harvest e-mail addresses for future spamming. They can also reduce a Web site’s bandwidth. A new site keeps an updated list of bad bots and crawlers. Web site host managers and business owners can download data for free from Botslist.com that can then be configured to block bad robots. It’s this month’s A Site to See.

IT Security

- What’s the number one threat to corporate security in 2007? While many believe it’s Web viruses, a new survey of European high level IT managers says it’s removable media devices.

IT Security

- The three biggest data security concerns for businesses: outside data harvesting attacks, exposing sensitive information to unauthorized users, and accidental loss of employee data. Read more about the report here.

A Site to See

- In order to ensure that your PC is protected from malware, it helps to run a few tests. Auditmypc.com offers just that: a handful of free, relatively quick self-assessments. Options include testing the strength of your firewall and your protection against pop-ups.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.