Security Policies

  • How Secure is SaaS?

    We look at Software-as-a-Service providers and whether or not you should outsource your security to these third party providers - the answer may surprise you.
    By Daniel Barros February 4, 2011 

  • Social Networking: Balancing Business Benefits Against Business Risks

    Are online social networking sites such as LinkedIn an essential business tool or an unnecessary security risk? This article explains the pros and cons of social networking for business.
    By Bill Bunter February 4, 2011 

  • The Most Common Duties of an Information Security Officer

    An Information Security Officer is a new job title with a variety of duties that were previously handled by risk management, compliance, the legal department, and the IT department of an organization. We took a look at several job postings and came up...
    By Finn Orfano January 21, 2011 


  • Security Recommendations for Laptop Theft Prevention

    Few targets are as tempting to a thief as an unattended laptop. The easy-to-steal device is often extremely expensive and usually houses even more valuable information. Fortunately there are a few security recommendations for laptop theft prevention...
    By Finn Orfano January 17, 2011 

  • Workplace Email Surveillance : Employee Privacy

    The increasing popularity of Internet & increased loss of privacy due to information technology has made many individuals dread the use of information technologies for communication of sensitive information. A lot of organizations monitor use of internet...
    By PreciousJohnDoe January 17, 2011 

  • How a Cell Phones Security Policy Can Prevent Security Threats in the Office

    The abundance of camera phones that also provide audio recording capabilities should make you take notice. Even in a secure environment, these devices can pose an information security risk to any type of business.
    By Finn Orfano January 10, 2011 


  • Physical Laptop Security - Protecting Your Laptop

    While we write a lot of articles about protecting your computer from viruses, there are also a number of programs and products that can protect your laptop from being stolen, help you recover it safely or destroy your sensitive data before the thief moves...
    By Aaron R. December 31, 2010 

  • Security Threats: Trojan Generators

    Creating Trojans does not require malware distributors and online thieves to code a Trojan themselves. Trojan generators are sold to bad guys with an option to customize how they want a Trojan to run, what it will steal, and how the stolen information...
    By Donna Buenaventura December 29, 2010 

  • Laptop Security: Using Wi-Fi Safely

    What are the risks of using hotspot connections? Is antivirus and firewall protection enough laptop security to keep you safe when using Wi-Fi networks?
    By Donna Buenaventura December 16, 2010 

  • The Role of MySpace in Business

    When MySpace was created, it was as a social networking site for people who wanted to connect to long lost friends, stay in touch with family members and meet new people with like interests. After a bit of evolution, the business marketer saw an opening...
    By Lucinda Watrous November 12, 2010 
showing 31-40 of 78    < Previous  |  page: 2 3 4 5 6 ...  |  Next >