Verizon Business has released the "2008 Data Breach Investigations Report" that spans four years and more than 500 forensic investigations. It includes analysis of three of the five largest corporate breaches ever reported. Key findings in the report indicate that 87 percent of all security breaches were avoidable through reasonable security measures. Other key findings include: Most … [Read more...]
Concerns Over Threats From Mobile Devices
Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals. The CompTIA survey of more than 2,000 individuals found that viruses and worms, cited by 54 percent of respondents, … [Read more...]
Best Practices for Security Management
Protecting your Enterprise IT system from threats both external and internal becomes harder each day. There will always be new methods of intrusion and infection that threaten your system. Your Security Management group should develop a set of best practices to ensure that your IT infrastructure is secure and can continue to support your business. … [Read more...]
Protect Your Network From USB Drives and Smart Phones
The need to protect your network from USB drives and smart phones is more important. Your employees bring the through the door each day and have no thought of plugging them into your company computers. USB drives and smart phone devices pose a serious threat to your data and your network. Data theft via portable devices has become increasingly easy using portable devices such as USB thumb … [Read more...]
Intel Anti-Theft Technology for Notebooks
Intel announced today at the Intel Developer Forum in Shanghai an upcoming technology that will help address the issue of laptop theft. This is a major concern for companies with a mobile workforce. By nature the portability of laptops make them ideal targets for theft. News headlines of laptops containing sensitive information such as Social Security numbers and confidential company information … [Read more...]