Cyber & technology – Page 30
-
Features
Look before making the technology leap
Do not invest in technology until you know exactly what you require it to do, say Chuck Teixeira and Grant Waterfall.
-
Features
Froogle continuity!
Google's 'Froogle' service compares cheapest internet sources for common consumer items. Business continuity solution economics prove harder to evaluate. Ian Hammond gives his company's own top ten affordable continuity "must-haves"
-
Features
Competing in the age of the continuous enterprise
Keith Tilley believes that companies outside the financial services sector are generally unaware of the damage that downtime causes and of how to prevent it.
-
Features
How effective is your security?
Steve Wright discusses how you can measure the effectiveness of security using ISO 27001.
-
Analysis
Identity theft is predicted to soar
ID theft cost British businesses £50m in 2005, and this is set to increase by 1,300% by 2020 to £700m.
-
Features
Business as usual?
You have a problem and you need to switch to your alternative off-site facility. But will it be the seamless transition you planned for? Jared Landin discusses how you can avoid unpleasant surprises.
-
Features
Regulatory confusion fuels fraud explosion
Simple, low-cost steps that could significantly reduce fraud are not being adopted by UK business. Richard Kusnierz explains why.
-
Analysis
Avoid E-mail chaos
Over a third (38%)of large organisations across the UK admit their e-mail management system is in 'complete chaos', according to the findings of a survey released by AIIM on compliance and its impact
-
Analysis
Online credit information
Coface UK has launched InfoLine - a service that combines factual business information with risk analysis to help businesses understand the creditworthiness of their customers.
-
Features
New fraud legislation on the horizon
The UK Fraud Bill may become law before the end of 2006. Neil Hodge discusses the implications.
-
Features
IT compliance reduces risk
How can companies ensure they are archiving and protecting business data to comply with electronic data laws? Hugh Jenkins explains.
-
Features
The testing element
Adam Ripley says that, in a world fraught with business risk, technology can often be the Achilles heel of an organisation.
-
Features
Don't forget the photocopier
You may have good security for your computer systems but what about other devices? Bernard Cassidy writes.
-
Features
Coping with a major security breach
Legal pressures, not to mention your moral obligation to assist unwitting victims, means that you should never delay when disclosing IT security incidents, says Martin Allen.
-
Analysis
Internet misuse can damage reputation
Staff misusing the internet by accessing inappropriate websites or engaging in excessive web-surfing remains the second largest cause of reported security incidents after viruses for large UK companie
-
Analysis
European businesses vulnerable to IT attacks
A survey of 600 IT professionals across France, Germany, Italy, the Netherlands, Spain and the UK revealed that almost half (45%) believe that their IT infrastructure is never totally protected from s
-
Analysis
IT reputation protection
ACE European Group (ACE) has joined forces with information security specialist QCC to offer crisis management consultancy as part of its IT network risk solution - ACE Dataguard.
-
Analysis
CORPORATES ARE SEEKING INNOVATIVE RISK SOLUTIONS
The global capital markets are becoming increasingly attractive to corporates in the communications and technology sectors as some (re)insurers fail to keep pace with change
-
Features
STRIKING A BALANCE
Chris Haden suggests some strategies for managing the onshore offshore conundrum





