All Technological Risk articles – Page 27
-
Online onlySmoothWall helps businesses clamp down on IM abuse
Security firm introduces IM monitoring as standard
-
AnalysisManaging your risk profile in 2008
Charlie Sherlock, CEO at Cinario discusses how a company can proactively manage its risk profile
-
FeaturesOpen source - A stealthy security risk?
Whether or not you know it, your organisation will be using open source software somewhere. Mark Tolliver explains the risks and how to control them
-
FeaturesDon't forget the other half
Security of electronic data is one thing, says Chris Haden, but documents need attention too
-
AnalysisSecurity industry closes ranks
Industry groups have come together to raise awareness about information security, but the biggest challenge for organisations—changing behaviour—still lies ahead
-
Online onlyEU should facilitate alert system for cyber attacks: ENISA
ENISA presents a study on a European Information Sharing and Alert System for SMEs and citizens: EU’s role proposed to be a ‘clearing house’
-
Online onlyBT launches ‘voice continuity’
New service safeguards voice networks in emergency situations
-
Online onlyFSA publishes Financial Risk Outlook
The UK’s financial services regulator warns firms and consumers of the risks inherent in a significantly less benign economic environment
-
Online only1 in 3 Brits are victims of cybertheft
But complacency remains biggest problem, according to AVG cybercrime survey
-
Online onlySurvey reveals widespread vulnerability to email outages
Also shows that many companies fail to plan for disaster recovery
-
AnalysisSFO employs security advisor
The Serious Fraud Office’s digital forensics unit has appointed a consultant to bolster its digital forensics capability and assess network security
-
AnalysisWhat firewalls do and what they don’t do
Ian Kilpatrick looks at some of the newer security threats that are able to find their way through firewalls
-
Online onlyFBI warns ‘vishing’ attacks increase
New scheme, similar to phishing, involves requesting a telephone call designed to steal information
-
Online onlyUS court imposes 16 year sentence for identity theft
Two men sentenced after their criminal ring defrauded banks by stealing personal details
-
Online only2008 identity theft outlook
Challenges ahead for business based on events of 2007, says the identity theft assistance center
-
AnalysisTop tips to virtual environments
Over the last year the uptake of virtualisation technologies has risen. An undesired consequence of virtualisation is that it increases the risk of unplanned downtime. Nick Turnbull, Marathon Technologies, provides top tips to consider before virtualising
-
Online onlyData security threatened by employee negligence
Survey shows 48% of UK companies at risk
-
Online onlyBarclays chairman latest fraud victim
Security firm calls for new authentication methods
-
AnalysisConverging IT with risk assessment?
Charlie Sherlock, CEO of Cinario, argues companies can devise benefits from IT risk management solutions
-
Online onlyNew solar cycle brings increased risk for electrical systems
The number of solar storms is expected to build gradually reaching maximum by 2011/12, says NOAA





