All Technological Risk articles – Page 33

  • Features

    Cost versus risk

    2004-11-04T00:00:00Z

    Keith Tilley discusses the importance of evaluating the risks associated with off-shoring business processes and what the risk management professional should consider when deciding to move mission-cri

  • Features

    Business as Usual

    2004-11-04T00:00:00Z

    Business continuity management programmes should be risk-based and consider all potential threats to the business, says Gareth Book

  • Analysis

    Blackout Lessons not learnt: Data still at risk

    2004-11-04T00:00:00Z

    Despite the blackouts that affected London, New York and Rome last year, research indicates that the majority of IT managers and CTOs were unaware of the extent of the data loss from power outages

  • Analysis

    Fighting fraud

    2004-09-15T00:00:00Z

    Following the recent UK case of former City secretary Joyti De-Laurey, who was jailed for seven years for defrauding her bosses of nearly £45m, many businesses do not realise that they may soon be req

  • Analysis

    E-attacks increase

    2004-09-15T00:00:00Z

    Most global financial institutions have had an external attack on their information technology systems within the last year, according to Deloitte's 2004 Global Security Survey

  • Features

    Heeding the wake up call

    2004-06-29T00:00:00Z

    Companies must recognise the threat of terrorism and the need to address it, stresses Mark Harris

  • Analysis

    Law cannot stop Spam

    2004-06-10T00:00:00Z

    The Institute for Information Law of the University of Amsterdam and Sybari Software recently announced the results of a European study into the law regulating unsolicited commercial communications (o

  • Features

    Protecting Intellectual Property

    2004-06-10T00:00:00Z

    With the European Parliament currently reviewing intellectual property rights, Richard Lane outlines current options

  • Features

    Leaving nothing to chance

    2004-06-10T00:00:00Z

    Do not wait for disaster to strike before you find out how resilient your business is Ian Masters explains why businesses need IT disaster recovery solutions and describes some options.

  • Features

    Ooops they've done it again!

    2004-06-10T00:00:00Z

    Internet malware is proliferating to such an extent that concerted global initiatives may provide the only real solution Sue Copeman writes.

  • Features

    Man Maketh the Machine

    2004-04-26T00:00:00Z

    Tom Teixeira discusses the reality of implementing an enterprise risk management software system

  • Features

    Customer Data Quality - A Threat Unrecognised?

    2004-04-26T00:00:00Z

    Tom Scampion asks whether we are alert to the increasing risks associated with the often-unknown quality of customer information and data integrity

  • Features

    An identity crisis?

    2004-04-26T00:00:00Z

    Establishing the identity of an individual, whether they are someone applying to become one of your customers or someone wanting to gain access to your building or computer system, is becoming a major

  • Analysis

    Protecting IPR

    2004-04-21T00:00:00Z

    In March MEPs voted by 330-151 (with 39 abstentions) to support a proposed directive protecting intellectual property rights and aimed at helping combat the increase in counterfeiting and piracy

  • Analysis

    IT EXPOSURE

    2004-03-16T00:00:00Z

    Despite the heightened threat from global terrorism, research from Compass Management Consulting suggests that companies' security and disaster recovery plans are not up to scratch and that companies

  • Features

    CORPORATE IT SECURITY

    2004-03-16T00:00:00Z

    Neil Chaney looks at the risks posed by unauthorised internal access to corporate data, and explains how to regain control

  • Analysis

    Detecting hi-tech crime

    2003-12-28T00:00:00Z

    Organisations' tendency to cover up discovery of high-tech

  • Features

    Special Report: Making the most of it

    2003-12-01T00:00:00Z

    Phil Reakes outlines the often overlooked benefits of recycling and remarketing IT equipment

  • Features

    The next frontier

    2003-10-23T00:00:00Z

    Martino Corbelli discusses the security and other implications

  • Features

    E-BUSINESS RISKS THE WIDER IMPLICATIONS

    2003-10-23T00:00:00Z

    John O'Neill asks whether we really understand the risks...