Compliance

rssRSS
  • The Importance of Developing and Testing a Security Policy

    If you have identified the need for a security policy, you will need to take into account matters of communication, compliance, and testing. Managing your email services, data sharing, use of portable hardware and what websites are available can all improve...
    By Christian Cawley September 30, 2011 

  • Why Dumpster Diving poses a Threat of Identity Theft

    Dumpster Diving - Imagine what an attacker knows about you if he searches your waste systematically over a period of time. Now combine that information with what can be found out about you on the Internet … Here’s what you should know about...
    By Mark Muller August 8, 2011 

  • Top Email Compliance Tips

    An alphabet soup of regulations including GLBA, HIPAA and SOX relevant to email demand your organization’s attention. This article features top email compliance tips valid anywhere the world where the use of email has gained the interest of lawmakers...
    By Mark Muller August 8, 2011 


  • Limewire: Is it Spyware?

    Downloading illegal music is common on the internet, but using a peer-to-peer program like Limewire to do it can have quick legal ramifications, since this program makes ISP tracing a snap.
    By Radell Hunter June 27, 2011 

  • Security Planning: Regulatory Considerations

    In this section, I’ll step through—at a high level—four common U.S. regulations which affect what controls you’ll design into your network. We’ll end with a short converstaiton about the PCI DSS, which forms the basis for...
    By Tom Olzak, CISSP May 23, 2011 

  • The Risks of Warez or Cracked Software

    Cracked software is free or low-cost, and seems to be a quick way to get the program you need. However, downloading software from the internet always has risks, especially when it is downloaded from a non-trustworthy source. Read on to find out what could...
    By Finn Orfano May 23, 2011 


  • Certification Questions on Information Systems Security

    What questions are on the certification exams for information security? What do students and personnel need to know to pass the exams so they can earn a professional certification?
    By Steve Mallard May 23, 2011 

  • Review of BitDefender Antivirus 2010

    I reviewed BitDefender Antivirus 2009 earlier this year and gave it 5 out of 5 for it’s breadth of features which made it stand out amongst the crowd of antivirus products. How does the 2010 version stand out? Keep reading to find out!
    By Ryan Tetzlaff May 20, 2011 

  • Top Free Backup Programs for Windows 7

    Here you find the best free backup programs for Windows 7 including Windows 7 Backup and Restore as well as FBackup, and on our candidate watch list for top free Windows 7 backup program we have Comodo BackUp, GFI Backup, Drive Backup Free Edition, TrueSafe...
    By Mark Muller May 16, 2011 

  • HIPAA Compliance Tips

    Why you need a dedicated analyst or officer to monitor your adherence.
    By Steve Mallard February 25, 2011 
showing 1-10 of 38 < Previous   |   page: 1   2   3   4   |   Next >