MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
Insurance & Technology
March 16, 2004
Peggy Bresnick-Kendle
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
InternetNews
April 1, 2004
Sharon Gaudin
Study: Virus Attacks Up But Infections Hold Steady Last year more -- and more dangerous -- viruses raced across the Internet than ever, according to a new study. But there was a glimmer of good news. mark for My Articles similar articles
HBS Working Knowledge
October 20, 2003
Wendy Guild Swearingen
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
Knowledge@Wharton
September 10, 2003
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alexandra Robbins
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. mark for My Articles similar articles
T.H.E. Journal
April 2004
Judith Rajala
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
T.H.E. Journal
February 2001
Symantec's Norton Anti-Virus 2000 Statistics illustrate how important it is for schools to protect their investment in computers by utilizing anti-virus software such as Symantec's Norton Anti-Virus 2000... mark for My Articles similar articles
T.H.E. Journal
April 2004
NetCleanse, Spam Sleuth Protect From Viruses and Spam Solutions for protection from viruses and spam that promise to eliminate computer vulnerabilities. mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
Unix Insider
January 2001
Sandra Henry-Stocker
Understanding viruses What exactly is a virus, how does it work, and how can you protect your system from one? The author explains the difference between viruses and worms, and why keeping up with and preventing them is so difficult... mark for My Articles similar articles
PC World
October 13, 2000
Kim Zetter
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... mark for My Articles similar articles
T.H.E. Journal
April 2004
Security Leaders Launch Initiative to Combat Emerging Threats An industrywide collaboration led by Cisco Systems Inc. is trying to limit damage from emerging security threats such as viruses and worms. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
PC World
September 2001
Sean Captain
Stealth Fighters Today's best antivirus programs are tough on PC parasites but easy on users... mark for My Articles similar articles
Bank Systems & Technology
May 7, 2007
Peggy Bresnick Kendler
Bank Tech Experts Discuss Vendor Relationships Here, these industry experts talk about outsourcing and offshoring along with other areas of bank tech concerns. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
PC Magazine
November 25, 2003
Under Attack! If you're not running software to protect your PC, you should be! We test 12 products that will protect your PC and those with which it shares cyberspace. mark for My Articles similar articles
InternetNews
December 23, 2003
Sharon Gaudin
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. mark for My Articles similar articles
Technology Research News
December 17, 2003
Kimberly Patch
Device guards Net against viruses Ordinary computers have no chance of being able to monitor the huge volumes of traffic flowing through the Internet. Specialized hardware, however, can. A device is poised to serve as a network sentry, scanning the full contents of every packet for signs of viruses and the like. mark for My Articles similar articles
PC Magazine
August 3, 2005
The Ten Biggest Problems in Computing and How We'll Solve Them Malicious computer attacks will go on, but you can be confident we'll get better at fighting them. mark for My Articles similar articles
Food Engineering
June 1, 2005
Kevin T. Higgins
Automation's Achilles' Heel Food plant engineers may shrug with indifference at the issue of controls-system security. But while networked systems, remote diagnostics and processing-floor visibility offer great benefits, the enabling technology can be a gateway for malicious intent. mark for My Articles similar articles
Inc.
October 2005
John Fried
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. mark for My Articles similar articles
T.H.E. Journal
November 2001
Sharon Ruckman
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... mark for My Articles similar articles
T.H.E. Journal
April 2005
Jackson Ratcliffe
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware. mark for My Articles similar articles
InternetNews
March 31, 2005
Tim Gray
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. mark for My Articles similar articles
PC Magazine
September 15, 2004
Neil J. Rubenking
Norton vs. McAfee: Top Antivirus Apps Square Off The best antivirus apps distinguish themselves by adding features outside the ordinary, features that give them additional power against attack by viruses, worms, or Trojans. mark for My Articles similar articles
Insurance & Technology
November 17, 2004
Wendy Toth
A Human Approach A recent study found that more than 70 percent of respondents failed to list training and raising employee awareness of information security as a top initiative. Yet communication among management may be the best security asset. mark for My Articles similar articles
InternetNews
March 4, 2005
Jim Wagner
Viruses Gearing up For The Smart Set As the boundaries between cell phones and desktop functionality blur, the danger of a worldwide wireless virus increases. mark for My Articles similar articles
Insurance & Technology
October 29, 2003
George V. Hulme
Summer Viruses Keep IT Security Busy The high cost of installing patches raises questions about the Microsoft platform. mark for My Articles similar articles
PC World
August 12, 2002
Tom Mainelli
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
Bank Systems & Technology
February 26, 2007
Peggy Bresnick Kendler
New E-Discovery Rules Pose Challenges for Banks Banks need to focus on putting policies in place to govern electronic information, say experts. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
T.H.E. Journal
August 2005
Irene Sandler
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. mark for My Articles similar articles
PC World
December 17, 2001
Russell Pavlicek
Is Linux Immune to E-Mail Viruses? Immunity is impossible, but the open-source operating system may be protected... mark for My Articles similar articles
PC World
January 2003
Stan Miastkowski
Step-By-Step: Set Antivirus Software for Maximum Protection Activate crucial settings to ensure that your system is completely protected. mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
CIO
July 15, 2001
Mark Gembicki
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
PC World
August 21, 2001
Sam Costello
Norton AntiVirus 2002 to Fight E-Mail Worms Symantec's latest antivirus tool scans e-mail attachments for unwanted viruses... mark for My Articles similar articles
New Architect
May 2002
Sarah Gordon
Distributing Viruses Should virus writers be allowed to post harmful code on the Web? mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Julie Gallagher
Security Attacks Double More awareness, savvy perpetrators contribute to reported increase in attacks on IT systems of financial institutions. mark for My Articles similar articles