INFORMATION

Site Map - IT

A Site to See

- A one-stop site for testing your PC's speed and security.

Crooks Zero in on Vulnerable Data

- Growth in "zero-day" attacks.

Security and Outsourcing: Negotiate Early

- The need to focus on security during negotiations with outsource contractors.

Haitian Money Laundering

- The fight against money laundering in Haiti.

Text Message Alerts and Tips

- Emerging security applications for text messaging.

Identity Theft Task Force

- Reaction to the President's Task Force on Identity Theft.

A Site to See

- In order to ensure that your PC is protected from malware, it helps to run a few tests. Auditmypc.com offers just that: a handful of free, relatively quick self-assessments. Options include testing the strength of your firewall and your protection against pop-ups.

Drive-By-Downloads

- About ten percent of Web pages contain malicious code, according to a Google study.

Business PC Risk

- Thirteen percent of corporate PCs have had unauthorized USB devices attached to them, creating the risk for data loss and malware to enter the corporate system.

Data Disaster?

- One-third of IT professionals believe that a major data breach could put their company out of business.

Crooks Zero in on Valuable Data

- Zero-day attacks - the name given to exploits of vulnerabilities for which no patch is available - are the bête noires of IT security. Unfortunately, discoveries of not-yet-patchable vulnerabilities are on the rise, raising the specter of more zero-day exploits. Learn more about zero-day attacks and what you can do to combat them here.

Security and Outsourcing: Negotiate Early

- As a growing number of U.S. companies outsource software creation and data-handling functions to service providers located in other countries, the issue of data protection has gained prominence. One such problem is that 'backdoors' could be inserted in code for later use and that personal financial data could be stolen.

Data Mining

- The bill (S. 236) introduced by Sen. Russ Feingold (D-WI) would monitor government use of data mining has been approved by the Senate Judiciary Committee.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.