Similar Articles |
|
Bank Technology News August 2006 Michael Sisk |
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. |
CIO November 15, 2000 Sarah D. Scalet |
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
Insurance & Technology July 12, 2006 Peggy Bresnick Kendler |
Managing Mobility Insurers are deploying mobile/wireless devices and applications to improve productivity in areas such as sales/agent support and claims. But security issues create risks. |
InternetNews January 17, 2007 Ed Sutherland |
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. |
CIO October 15, 2003 Eric Knorr |
You Want Wi-Fi with That? Roadside wireless options abound -- even at McDonald's -- but can you let users take advantage and still keep your systems safe? |
InternetNews September 27, 2006 Ed Sutherland |
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. |
PC World August 2004 Anne Kandra |
Keep Your Hands on Your Handhelds How to prevent laptops and other portable devices from being stolen or lost. |
PC Magazine September 11, 2009 Jamie Lendino |
Kill Your Phone Remotely Many of today's most popular smartphones can be erased remotely if they are lost or stolen; here's how to do it. |
InternetNews December 14, 2006 Ed Sutherland |
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? |
PC World June 2006 Andrew Brandt |
This Stolen Laptop Will Self-Destruct in 5 Seconds When a device is in the wrong hands, protecting the data in it is no longer Mission: Impossible. |
Bank Technology News April 2010 John Adams |
Mobile Apps Let Staff Travel Light Financial institutions are starting to extend CRM capabilities to remote staff through mobile devices, taking advantage of advances in screen resolution and data mining capabilities to turn iPhone, BlackBerry and Windows Mobile phones into cross-sell tools. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
InternetNews February 13, 2007 Ed Sutherland |
FBI Laptops Make Most Wanted List Audit reports lost and stolen FBI laptops included computers in anti-terror and counter-spy programs. |
Wall Street & Technology January 23, 2007 Cory Levine |
Data Privacy: Financial Institutions Try to Keep Data Breaches Down in 2007 Several big-name data breaches made 2006 an ugly year for the securities industry, and security and privacy professionals are hoping to bring the problem to a halt this year. |
CIO June 29, 2011 |
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. |
PC Magazine September 20, 2006 Russell Morgan |
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. |
Bank Technology News February 2004 Michael Sisk |
2004 Guide to Outsourcing: Outsourcing's Getting More Remote The pressing operational issue is no longer how to let customers do business remotely, but how to allow employees. It is not an easy nut to crack. |
Bank Technology News July 2008 Barry Cox |
Automating Management of the Branch Office Network Some financial services IT departments with high availability requirements and limited staff at distributed locations are turning toward a new remote management approach. |
Bank Systems & Technology August 2, 2005 Steven Marlin |
The Little Bank That Could An interview with George Rapp, director of IT at Stonebridge Bank, uniquely positioned as a local financial institution and a cutting-edge Internet bank. Here, Rapp explains the bank's two-factor authentication strategy. |
PC Magazine November 14, 2007 Matthew D. Sarrel |
Mobile Customer Relations Pyxis Mobile's Wholesaler mobile CRM will help you integrate sales and operations tracking. |
Entrepreneur November 2002 Mark Henricks |
Keep it Moving Just because you're on the road and out of the office doesn't have to mean your productivity will suffer. |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
PC World December 20, 2006 Kirk Steers |
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. |
InternetNews December 19, 2008 Andy Patrizio |
One Laptop Per Child a Solar Movement No electricity? No problem. The One Laptop Per Child project has solar-powered laptops for kids in the most remote corners of the world. |
Wall Street & Technology May 25, 2005 Anthony Guerra |
Marrying Wireless and CRM According to the manager of application management of Pioneer Investments, the firm needed a solution to get its salespeople the vital CRM information they needed while on the road. Blackberry, Pyxis Mobile and Epiphany provide the answer. |
InternetNews September 22, 2010 |
Usage Rules Crucial for Enterprise Security New study finds that remote workers are more likely to venture to forbidden websites but they're better at avoiding malware. |
T.H.E. Journal April 2005 Philip Lombardi |
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. |
PC World September 2004 Andrew Brandt |
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. |
InternetNews November 6, 2009 |
Laptop Heist Exposes Doctors' Personal Data Another stolen laptop puts thousands of people's personal data at risk but this time it's the caregivers - not the patients - who are at risk. |
Home Theater October 30, 2005 Darryl Wilkinson |
Step Away from the Remote Control PRISM Sales International believes it has found a way to end the agony of the lost remote. |
Fast Company November 2008 Arianne Cohen |
Lojack for Laptops Companies lose billions of dollars a year in hardware and data. Here's how the good guys try to get the stuff back. |
Wall Street & Technology January 23, 2007 Greg MacSweeney |
Web 2.0 and Data Privacy Will Define Financial Services in 2007, Says Steve Rapp, SVP; CIO, Nicholas Applegate. The move to further protect client data and the maturation of Web 2.0 related businesses are two topics that will define financial services in 2007. |
PC Magazine July 11, 2005 Craig Ellison |
blueRoam The blueRoam virtual private network (VPN) is a cost-effective software-based SSL VPN solution that still has a few rough edges. |
PC World July 2005 Scott Dunn |
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... |