All Technological Risk articles – Page 27
-
Online only
SmoothWall helps businesses clamp down on IM abuse
Security firm introduces IM monitoring as standard
-
Analysis
Managing your risk profile in 2008
Charlie Sherlock, CEO at Cinario discusses how a company can proactively manage its risk profile
-
Features
Open source - A stealthy security risk?
Whether or not you know it, your organisation will be using open source software somewhere. Mark Tolliver explains the risks and how to control them
-
Features
Don't forget the other half
Security of electronic data is one thing, says Chris Haden, but documents need attention too
-
Analysis
Security industry closes ranks
Industry groups have come together to raise awareness about information security, but the biggest challenge for organisations—changing behaviour—still lies ahead
-
Online only
EU should facilitate alert system for cyber attacks: ENISA
ENISA presents a study on a European Information Sharing and Alert System for SMEs and citizens: EU’s role proposed to be a ‘clearing house’
-
Online only
BT launches ‘voice continuity’
New service safeguards voice networks in emergency situations
-
Online only
FSA publishes Financial Risk Outlook
The UK’s financial services regulator warns firms and consumers of the risks inherent in a significantly less benign economic environment
-
Online only
1 in 3 Brits are victims of cybertheft
But complacency remains biggest problem, according to AVG cybercrime survey
-
Online only
Survey reveals widespread vulnerability to email outages
Also shows that many companies fail to plan for disaster recovery
-
Analysis
SFO employs security advisor
The Serious Fraud Office’s digital forensics unit has appointed a consultant to bolster its digital forensics capability and assess network security
-
Analysis
What firewalls do and what they don’t do
Ian Kilpatrick looks at some of the newer security threats that are able to find their way through firewalls
-
Online only
FBI warns ‘vishing’ attacks increase
New scheme, similar to phishing, involves requesting a telephone call designed to steal information
-
Online only
US court imposes 16 year sentence for identity theft
Two men sentenced after their criminal ring defrauded banks by stealing personal details
-
Online only
2008 identity theft outlook
Challenges ahead for business based on events of 2007, says the identity theft assistance center
-
Analysis
Top tips to virtual environments
Over the last year the uptake of virtualisation technologies has risen. An undesired consequence of virtualisation is that it increases the risk of unplanned downtime. Nick Turnbull, Marathon Technologies, provides top tips to consider before virtualising
-
Online only
Data security threatened by employee negligence
Survey shows 48% of UK companies at risk
-
Online only
Barclays chairman latest fraud victim
Security firm calls for new authentication methods
-
Analysis
Converging IT with risk assessment?
Charlie Sherlock, CEO of Cinario, argues companies can devise benefits from IT risk management solutions
-
Online only
New solar cycle brings increased risk for electrical systems
The number of solar storms is expected to build gradually reaching maximum by 2011/12, says NOAA