securecomputing.blogspot.com
Keep IT Safe: July 2005
http://securecomputing.blogspot.com/2005_07_01_archive.html
Thursday, July 14, 2005. Back to the Basics. If someone sneaks into a museum in the dead of night, dressed in spandex and night googles, and makes off with a Bottecelli, in the morning there is a big square of unfaded wall, an empty nail, a light dusting of tracked-through laser-detection talcum powder, and. The threats come in three flavors, and there are steps that you can take to protect yourself from each one. 1 The Barbarians at the Gates. 2 The Enemy Within. Training, monitoring, set usage policies...
jcmann.blogspot.com
Accounting and Business Technologies | Joanie Mann: Protecting Yourself Against Data Theft
http://jcmann.blogspot.com/2011/04/protecting-yourself-against-data-theft.html
Here's where you will find articles from Joanie Mann (and others) relating to Accounting and Business Technology, Cloud Computing, SaaS, QuickBooks Hosting, Small Business Finance, and Sustainability. Thursday, April 28, 2011. Protecting Yourself Against Data Theft. Protecting Yourself Against Data Theft. By Michael Ehart, CISSP, etc. So what do you do to keep your data secure? The threats come in three flavors, and there are steps that you can take to protect yourself from each one. 2 The Enemy Within.
securecomputing.blogspot.com
Keep IT Safe: June 2005
http://securecomputing.blogspot.com/2005_06_01_archive.html
Thursday, June 16, 2005. Some excellent practical suggestions on wireless from ComputerWorld. Stehman listed several best practices executives can follow to avoid compliance problems. Among them are making sure of the following:. All user devices are tested and certified by the IT staff prior to being connected to the wireless network. Help desk support personnel receive hands-on training for all of the wireless devices certified by IT staffers. All wireless applications have a designated owner.".
securecomputing.blogspot.com
Keep IT Safe: May 2005
http://securecomputing.blogspot.com/2005_05_01_archive.html
Tuesday, May 31, 2005. House votes to outlaw spyware. Consumers have a right to know and have a right to decide who has access to their highly personal information that spyware can collect," said California Republican Rep. Mary Bono, who sponsored one of the bills. The practice known as "phishing" - in which scam artists pose as banks or other businesses in an attempt to trick consumers into divulging account information - would also be outlawed. ". Posted by michael @ 12:57 PM. Wednesday, May 25, 2005.