Employees sipping café Java over their wireless laptops may think a VPN makes them safe and secure. With careful configuration, there's some chance they're right.
Malcolm Wheatley |
18 Dec |
Read more
Not long ago, the legal department at a financial services company in New York got a phone call from a hospital in London. The query: Why are you hacking us? With two known IP addresses, it wasn't difficult for the financial firm's information security staff to go back through the logs looking for traffic between the two organizations. And with the traffic identified, locating the computer from which the hacks were taking place didn't take long, either. The culprit: an individual who-as their human resources records soon confirmed-had formerly worked at that very hospital.
Malcolm Wheatley |
11 Sep |
Read more
The Information Technology Infrastructure Library is coming; early adopters say it's a friendly invasion.
Malcolm Wheatley |
01 Jun |
Read more
Business continuity plans truly work only if they take employee needs into account.
Malcolm Wheatley |
21 Jul |
Read more
Good guys versus bad guys: That's every crime reduced to its most elemental level. In the shadowy world of cybercrime, though, the rules and tools for both sides are evolving at a breakneck pace.
Malcolm Wheatley |
25 May |
Read more
Cleaning dirty data is not just a matter of mastering the technical challenges. It requires making sure your staff is working closely with the business every step of the way
Malcolm Wheatley |
10 Sep |
Read more
Using an application service provider means your computer application is running on someone else’s server. Is the provider’s security up to snuff? Better know which questions to ask.
Malcolm Wheatley |
02 Apr |
Read more
A poorly handled employee termination can create a slew of security risks. That's why CIOs and CSOs need a process for letting workers go.
Malcolm Wheatley |
08 Oct |
Read more