All Technological Risk articles – Page 33
-
Features
Cost versus risk
Keith Tilley discusses the importance of evaluating the risks associated with off-shoring business processes and what the risk management professional should consider when deciding to move mission-cri
-
Features
Business as Usual
Business continuity management programmes should be risk-based and consider all potential threats to the business, says Gareth Book
-
Analysis
Blackout Lessons not learnt: Data still at risk
Despite the blackouts that affected London, New York and Rome last year, research indicates that the majority of IT managers and CTOs were unaware of the extent of the data loss from power outages
-
Analysis
Fighting fraud
Following the recent UK case of former City secretary Joyti De-Laurey, who was jailed for seven years for defrauding her bosses of nearly £45m, many businesses do not realise that they may soon be req
-
Analysis
E-attacks increase
Most global financial institutions have had an external attack on their information technology systems within the last year, according to Deloitte's 2004 Global Security Survey
-
Features
Heeding the wake up call
Companies must recognise the threat of terrorism and the need to address it, stresses Mark Harris
-
Analysis
Law cannot stop Spam
The Institute for Information Law of the University of Amsterdam and Sybari Software recently announced the results of a European study into the law regulating unsolicited commercial communications (o
-
Features
Protecting Intellectual Property
With the European Parliament currently reviewing intellectual property rights, Richard Lane outlines current options
-
Features
Leaving nothing to chance
Do not wait for disaster to strike before you find out how resilient your business is Ian Masters explains why businesses need IT disaster recovery solutions and describes some options.
-
Features
Ooops they've done it again!
Internet malware is proliferating to such an extent that concerted global initiatives may provide the only real solution Sue Copeman writes.
-
Features
Man Maketh the Machine
Tom Teixeira discusses the reality of implementing an enterprise risk management software system
-
Features
Customer Data Quality - A Threat Unrecognised?
Tom Scampion asks whether we are alert to the increasing risks associated with the often-unknown quality of customer information and data integrity
-
Features
An identity crisis?
Establishing the identity of an individual, whether they are someone applying to become one of your customers or someone wanting to gain access to your building or computer system, is becoming a major
-
Analysis
Protecting IPR
In March MEPs voted by 330-151 (with 39 abstentions) to support a proposed directive protecting intellectual property rights and aimed at helping combat the increase in counterfeiting and piracy
-
Analysis
IT EXPOSURE
Despite the heightened threat from global terrorism, research from Compass Management Consulting suggests that companies' security and disaster recovery plans are not up to scratch and that companies
-
Features
CORPORATE IT SECURITY
Neil Chaney looks at the risks posed by unauthorised internal access to corporate data, and explains how to regain control
-
Features
Special Report: Making the most of it
Phil Reakes outlines the often overlooked benefits of recycling and remarketing IT equipment
-
Features
E-BUSINESS RISKS THE WIDER IMPLICATIONS
John O'Neill asks whether we really understand the risks...