All Technological Risk articles – Page 36

  • Analysis

    Stopping occupational spammers

    2001-06-14T00:00:00Z

    A recent survey by Gartner Group found that up to one-third of internal business e-mail was unnecessary.

  • Features

    Intranet training

    2001-06-14T00:00:00Z

    Has your organisation got a large number of employees? If so, video programmes may be effective in getting the risk management message across, says Ray Williams.

  • Analysis

    Internet warning

    2001-06-14T00:00:00Z

    The risks from e-commerce and using the internet are little understood and potentially crippling, according to Oliver Prior, research and development director of Willis Group Ltd.

  • Analysis

    Failure to take information security seriously

    2001-06-14T00:00:00Z

    Half of all IT managers do not know if their organisation has an information security policy in place.

  • Features

    Embedded risk management - the new grail?

    2001-06-14T00:00:00Z

    Outsourcing can mean entrusting your hard won customers and reputation to someone else. Can you be sure their risk management principles and processes match yours? Rosie Harrison reports.

  • Features

    Don't be a fraud victim

    2001-06-14T00:00:00Z

    Take a tough line to prevent fraud says Geoff Covey.

  • Features

    Data protection - do you comply?

    2001-06-14T00:00:00Z

    Eduardo Ustaran discusses the setting up of an organisation-wide data protection compliance programme, and provides practical recommendations for businesses.

  • Features

    Dot com or dot con?

    2001-06-14T00:00:00Z

    The internet has not lived up to many companies' expectations. Micahel Bates looks at ways of making your e-business work.

  • Features

    Brandrisk.com

    2001-06-14T00:00:00Z

    Mia Pandey discusses how established brands have managed their risk when moving to the on-line environment.

  • Features

    Systems under attack

    2001-06-14T00:00:00Z

    Once, thieves only burgled your safe. Today they break into your computers, say Phil Sealey & Yag Kanani.

  • Features

    Licensing in IPR

    2001-06-12T00:00:00Z

    Simon Harper discusses the points to watch for when acquiring rights to use other people's intellectual property.

  • Features

    How safe is your intellectual property?

    2001-06-12T00:00:00Z

    Howard Cottrell says that misrepresentation of brand image will escalate with the internet explosion, but companies are taking surprisingly few precautions to protect themselves.

  • Features

    Virtual hazards

    2001-06-12T00:00:00Z

    IT can leave you exposed to unprotected and unexpected risks, warns Janet Edey.

  • Features

    What e-commerce strategy?

    2001-06-12T00:00:00Z

    Companies without an e-commerce strategy could be in breach of best corporate governance standards. Martin Rayfield suggests that the situation is not so clear cut.

  • Features

    Sharewatch

    2001-06-11T00:00:00Z

    Sam Parkhouse looks at the relationship between strategy and share performance.

  • Analysis

    Data protection

    2001-06-06T00:00:00Z

    The new Data Protection Act extends the 1984 legislation in a number of areas and provides data subjects with some additional rights.

  • Analysis

    Tackling cyber risks

    2001-06-06T00:00:00Z

    Many insurance industry players are focusing on designing products and facilities to help companies deal with the new "cyber risks" arising from e-business activities.