Theft of confidential information is a risk to the business and IT plays a large role in protecting the data. Not all data is electronic though. Files that identify customers and employees, Social Security numbers, credit card information and other account data are just some of the forms of sensitive data a company must protect. Failing to protect confidential information can lead to identify … [Read more...]
VASCO Data Security Offers Authentication Services Based on INDENTIKEY
VASCO Data Security Inc. a leading software security company specializing in authentication products, and the IT service provider datec24 Services are partnering to offer subscription-based DIGIPASS authentication to datec24 customers. Under the terms of the agreement datec24 will host VASCO’s IDENTIKEY® server. The IDENTIKEY server will be used to offer on-demand authentication to a number of … [Read more...]
HP Offers Free Web Security Tool to Help Businesses Guard Against Malicious Hackers
HP today announced HP SWFScan, a free tool to help Flash developers protect their websites against unintended application security vulnerabilities and reduce the risk of hackers accessing sensitive data. As companies modernize their applications to give users a better experience online, they are moving to Web 2.0 technologies, including the Adobe Flash Platform. With Adobe Flash Player … [Read more...]
IBM Internet Security Systems Expands Services
With increasing cyber threats, IBM is introducing new identify and access management services, work with strategic partners and offer a complimentary comprehensive financial assessment of security infrastructure management costs. Today, IBM announced a set of actions to bolster its security solutions that can help clients save costs while navigating the "perfect storm" of security threats … [Read more...]
Best Practices for Security Management
Protecting your Enterprise IT system from threats both external and internal becomes harder each day. There will always be new methods of intrusion and infection that threaten your system. Your Security Management group should develop a set of best practices to ensure that your IT infrastructure is secure and can continue to support your business. … [Read more...]
Protect Your Network From USB Drives and Smart Phones
The need to protect your network from USB drives and smart phones is more important. Your employees bring the through the door each day and have no thought of plugging them into your company computers. USB drives and smart phone devices pose a serious threat to your data and your network. Data theft via portable devices has become increasingly easy using portable devices such as USB thumb … [Read more...]