MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
Insurance & Technology
July 12, 2006
Peggy Bresnick Kendler
Managing Mobility Insurers are deploying mobile/wireless devices and applications to improve productivity in areas such as sales/agent support and claims. But security issues create risks. mark for My Articles similar articles
InternetNews
January 17, 2007
Ed Sutherland
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. mark for My Articles similar articles
CIO
October 15, 2003
Eric Knorr
You Want Wi-Fi with That? Roadside wireless options abound -- even at McDonald's -- but can you let users take advantage and still keep your systems safe? mark for My Articles similar articles
InternetNews
September 27, 2006
Ed Sutherland
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. mark for My Articles similar articles
PC World
August 2004
Anne Kandra
Keep Your Hands on Your Handhelds How to prevent laptops and other portable devices from being stolen or lost. mark for My Articles similar articles
PC Magazine
September 11, 2009
Jamie Lendino
Kill Your Phone Remotely Many of today's most popular smartphones can be erased remotely if they are lost or stolen; here's how to do it. mark for My Articles similar articles
InternetNews
December 14, 2006
Ed Sutherland
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? mark for My Articles similar articles
PC World
June 2006
Andrew Brandt
This Stolen Laptop Will Self-Destruct in 5 Seconds When a device is in the wrong hands, protecting the data in it is no longer Mission: Impossible. mark for My Articles similar articles
Bank Technology News
April 2010
John Adams
Mobile Apps Let Staff Travel Light Financial institutions are starting to extend CRM capabilities to remote staff through mobile devices, taking advantage of advances in screen resolution and data mining capabilities to turn iPhone, BlackBerry and Windows Mobile phones into cross-sell tools. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
InternetNews
February 13, 2007
Ed Sutherland
FBI Laptops Make Most Wanted List Audit reports lost and stolen FBI laptops included computers in anti-terror and counter-spy programs. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Cory Levine
Data Privacy: Financial Institutions Try to Keep Data Breaches Down in 2007 Several big-name data breaches made 2006 an ugly year for the securities industry, and security and privacy professionals are hoping to bring the problem to a halt this year. mark for My Articles similar articles
CIO
June 29, 2011
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. mark for My Articles similar articles
PC Magazine
September 20, 2006
Russell Morgan
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. mark for My Articles similar articles
Bank Technology News
February 2004
Michael Sisk
2004 Guide to Outsourcing: Outsourcing's Getting More Remote The pressing operational issue is no longer how to let customers do business remotely, but how to allow employees. It is not an easy nut to crack. mark for My Articles similar articles
Bank Technology News
July 2008
Barry Cox
Automating Management of the Branch Office Network Some financial services IT departments with high availability requirements and limited staff at distributed locations are turning toward a new remote management approach. mark for My Articles similar articles
Bank Systems & Technology
August 2, 2005
Steven Marlin
The Little Bank That Could An interview with George Rapp, director of IT at Stonebridge Bank, uniquely positioned as a local financial institution and a cutting-edge Internet bank. Here, Rapp explains the bank's two-factor authentication strategy. mark for My Articles similar articles
PC Magazine
November 14, 2007
Matthew D. Sarrel
Mobile Customer Relations Pyxis Mobile's Wholesaler mobile CRM will help you integrate sales and operations tracking. mark for My Articles similar articles
Entrepreneur
November 2002
Mark Henricks
Keep it Moving Just because you're on the road and out of the office doesn't have to mean your productivity will suffer. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
PC World
December 20, 2006
Kirk Steers
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. mark for My Articles similar articles
InternetNews
December 19, 2008
Andy Patrizio
One Laptop Per Child a Solar Movement No electricity? No problem. The One Laptop Per Child project has solar-powered laptops for kids in the most remote corners of the world. mark for My Articles similar articles
Wall Street & Technology
May 25, 2005
Anthony Guerra
Marrying Wireless and CRM According to the manager of application management of Pioneer Investments, the firm needed a solution to get its salespeople the vital CRM information they needed while on the road. Blackberry, Pyxis Mobile and Epiphany provide the answer. mark for My Articles similar articles
InternetNews
September 22, 2010
Usage Rules Crucial for Enterprise Security New study finds that remote workers are more likely to venture to forbidden websites but they're better at avoiding malware. mark for My Articles similar articles
T.H.E. Journal
April 2005
Philip Lombardi
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
InternetNews
November 6, 2009
Laptop Heist Exposes Doctors' Personal Data Another stolen laptop puts thousands of people's personal data at risk but this time it's the caregivers - not the patients - who are at risk. mark for My Articles similar articles
Home Theater
October 30, 2005
Darryl Wilkinson
Step Away from the Remote Control PRISM Sales International believes it has found a way to end the agony of the lost remote. mark for My Articles similar articles
Fast Company
November 2008
Arianne Cohen
Lojack for Laptops Companies lose billions of dollars a year in hardware and data. Here's how the good guys try to get the stuff back. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Greg MacSweeney
Web 2.0 and Data Privacy Will Define Financial Services in 2007, Says Steve Rapp, SVP; CIO, Nicholas Applegate. The move to further protect client data and the maturation of Web 2.0 related businesses are two topics that will define financial services in 2007. mark for My Articles similar articles
PC Magazine
July 11, 2005
Craig Ellison
blueRoam The blueRoam virtual private network (VPN) is a cost-effective software-based SSL VPN solution that still has a few rough edges. mark for My Articles similar articles
PC World
July 2005
Scott Dunn
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... mark for My Articles similar articles