Security begins with policies

Security begins with policies

Running an enterprise without a formalized security policy seems as imprudent as installing office-building doors without locks. However, according to...

November 28th, 2002 Kristy Pryma

We

We

The job of security is to protect systems from their weakest link and most experts agree that if there is...

October 3rd, 2002 Victoria Berry

Eradicating bad e-haviour

Eradicating bad e-haviour

Melissa, I Love You, Code Red, Nimda - the mere mention of these network-threatening pathogens, and the ease with which...

November 30th, 2001 Scott Gardner

Eradicating bad e-haviour

Eradicating bad e-haviour

Melissa, I Love You, Code Red, Nimda -the mere mention of these network-threatening pathogens, and the ease with which inexperienced...

November 1st, 2001 Scott Gardner

Eradicating bad e-haviour

Eradicating bad e-haviour

Melissa, I Love You, Code Red, Nimda - the mere mention of these network-threatening pathogens, and the ease with which...

November 1st, 2001 Scott Gardner

Consultant: Security means less internal access

Consultant: Security means less internal access

Internal hacking is the largest threat an e-commerce company faces, according to one security expert.Fred Cotton, CEO of Fred Cotton...

May 18th, 2000 Victoria Berry

Access provides the key to internal damages

Access provides the key to internal damages

Internal hacking is the largest threat an e-commerce company faces, according to one security expert.Fred Cotton, CEO of Fred Cotton...

May 4th, 2000 Victoria Berry

Practising safe access

Practising safe access

Battening down a corporate network against external attacks isn't as easy as 1, 2, 3, but it's not exactly rocket...

October 21st, 1999 Michael Martin

Study: no security standards

Study: no security standards

Nearly 20 per cent of companies have no formal IT security policy or standard in operation, according to a study...

October 21st, 1999 Cindy Steinman