All IT articles – Page 4
-
Features
Look, no wires!
Verne Meredith suggests an approach to the risks posed by the wireless environment.
-
Features
A question of identity
John Bullard outlines the Identrus model and its applicability for those responsible for the treasury function.
-
Analysis
Serious fraud escalates
Big business is losing out to fraudsters, with over EURO3.6bn lost in the last two years
-
Analysis
Failure to take information security seriously
Half of all IT managers do not know if their organisation has an information security policy in place.
-
Features
Systems under attack
Once, thieves only burgled your safe. Today they break into your computers, say Phil Sealey & Yag Kanani.
-
Features
Licensing in IPR
Simon Harper discusses the points to watch for when acquiring rights to use other people's intellectual property.
-
Features
How safe is your intellectual property?
Howard Cottrell says that misrepresentation of brand image will escalate with the internet explosion, but companies are taking surprisingly few precautions to protect themselves.
-
Features
Virtual hazards
IT can leave you exposed to unprotected and unexpected risks, warns Janet Edey.
-
Analysis
Preventing fraud
A new CBI publication says corporate fraud costs businesses hundreds of millions of pounds each year, and ignoring the risk is not an option.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Next Page