Cyber & technology – Page 32

  • Features

    Don't lose your voice

    2005-11-14T00:00:00Z

    Telephony systems rarely make it onto the list of business continuity Šrequirements says Graham Chick.

  • Analysis

    MALWARE TRENDS

    2005-11-14T00:00:00Z

    Malware trends have shown no sign of slowing, according to F-Secure

  • Features

    X-RATED EXPOSURES

    2005-11-14T00:00:00Z

    Julie Connor assesses the risks caused by employees accessing illicit images in the workplace

  • Features

    Fraud: The great unmanaged risk?

    2005-11-14T00:00:00Z

    Allan McDonagh discusses why the tone at the top is key to effective fraud prevention

  • Features

    Corporate blogging - the new phenomenon

    2005-11-14T00:00:00Z

    Marian Bloodworth and Louise Mason say that corporate blogging can produce benefits

  • Features

    Fast and the furious

    2005-10-04T00:00:00Z

    Faced with a high rate of software piracy, publishers are fighting back John Lovelock discusses why you should reduce the risk to your company by ensuring software compliance.

  • Analysis

    Increasing threat of network risk

    2005-10-04T00:00:00Z

    Almost 60% of chief risk officers and senior risk managers view...

  • Features

    Keeping it out of the courtroom

    2005-04-20T00:00:00Z

    David Sharp reveals the secrets of how you can work more constructively with your information technology suppliers to avoid disputes

  • Features

    Risky Business

    2005-04-20T00:00:00Z

    Michael Burling discusses the dangers posed by ineffective provisioning of user access rights and details how a secure enterprise provisioning system addresses specific risk areas highlighted by the U

  • engaged investor data cabinets
    Analysis

    Report clarifies data breach rules in Europe

    2005-03-01T00:00:00Z

    Telecoms operators are confused about what they need to do to comply with EU rules

  • Features

    Well documented decisions

    2005-02-28T00:00:00Z

    Ashley Bailey says that it is important to balance risk against cost when identifying the optimum document management systems

  • Features

    Coming Clean

    2005-02-28T00:00:00Z

    How well are institutions coping with money-laundering regulations Lee Coppack investigates

  • Features

    Site Security and Systems

    2005-02-28T00:00:00Z

    How are organisations managing or going to manage the new and substantial demands placed on site security teams? Bruno Brunskill challenges whether these demands have been fully appreciated

  • Features

    Working away

    2005-02-28T00:00:00Z

    Remote working is growing in popularity, but it does bring risks John Eary stresses the need for security when work is done away from the office.

  • Analysis

    Fraud figures up

    2005-02-28T00:00:00Z

    The total number of fraud cases in the UK rose by 14% in 2004, according to the latest figures from KPMG's Fraud Barometer, while the overall value of the frauds fell by 12%

  • Analysis

    Fighting Fraud

    2004-12-20T00:00:00Z

  • Features

    Messages that come back to haunt you

    2004-12-20T00:00:00Z

    Incriminating e-mails are increasingly being produced as evidence in corporate crime trials

  • Analysis

    £40bn crime cost

    2004-12-20T00:00:00Z

  • AIRMIC Portfolio

    Traditional e-Security measures "will break down"

    2004-12-20T00:00:00Z

    Internet security specialist David Lacey of the Royal Mail warned that cyber-crime is increasing in sophistication but is not yet fully mature

  • Features

    Business as Usual

    2004-11-04T00:00:00Z

    Business continuity management programmes should be risk-based and consider all potential threats to the business, says Gareth Book