Network Security

  • Stop SMiShing From Harming Your Business

    Ever received feedback that your business has been SMiSHed? How does SMiSHing weaken your enterprise security measures, and what can be done to stop it? We’ll cover these questions and more with tips to help prevent your business from becoming...
    By Donna Buenaventura August 8, 2011 

  • Characterizing Cybercrime: A Look at Different Types of Threats

    In April of 2011, the Verizon RISK team, the US Secret Service and the Dutch High Tech Crime unit released the latest version of the Data Breach Investigations report. It is the culmination of a year long study defining types, methods and characteristics...
    By Chris Orr August 8, 2011 

  • Network Security and All Its Various Forms

    Network security is a broad topic that incorporates many different skill sets and types of network security devices, policies and education. An understanding of these issues is vital to a strong security plan.
    By Maria E. Montoya August 8, 2011 


  • Security Procedures Observed by Computer Forensics Investigators

    Find out how computer forensics investigators perform the tasks of building evidence against cyber criminals without having to violate privacy policies. The recent cyber attacks launched against high-profile organizations have renewed the call for upholding...
    By ciel s cantoria July 27, 2011 

  • The Data Security Market is Big and Getting Bigger

    With the recent press around the breaches at Sony Entertainment and Wiki Leaks, the data security market continues to grow its share of information technology budgets.
    By Chris Orr July 14, 2011 

  • Do Laws Prevent or Legalize Spam?

    An estimated 90 percent of all emails in mid 2010 were spam; contrast this against seven percent in 2001. To make matters worse, most of these are fraud or deceptive in nature, and may contain malware or other security risks. Anti-spam laws that try...
    By N Nayab July 14, 2011 


  • What Can You Do to Avoid Clickjacking?

    Consumers would be shocked to discover just how vulnerable they are to clickjacking. Even though it exploits some serious computer security issues, it is possible to defend against. Here is how.
    By Steve McFarlane July 14, 2011 

  • Possible Network Security Breach Causes

    Network administrators are always faced with security breaches. A network, by its very nature, is susceptible to many kinds of attacks. In this article, we look at a few common network security problems.
    By Karishma Sundaram July 11, 2011 

  • Small Business Data Protection: Dos and Dont's of Encryption

    Data Pilferage is on the rise and the age old methods of encryption are still in use, more so than before. Surveys predict the rise od data theft by more 70% each year and that is an alarming increase. That's where encryption comes into play....
    By Ashwin Satyanarayana July 5, 2011 

  • The Data Security Incident Management Process: Policies, Teams, and Communication

    In this series of articles, we examine how to prepare for and manage data loss incidents in a way that minimizes financial business impact or harm to customers or employees. In Part 1, we begin with an overview of the process and a look at the first steps...
    By Tom Olzak, CISSP July 4, 2011 
showing 11-20 of 154 < Previous   |   page: 1   2   3   4   5  ...   |   Next >