MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
Insurance & Technology
May 18, 2004
Paul McDougall
Laptop Theft Compromises Data GMAC Financial Services customers have personal data stolen. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
InternetNews
September 27, 2006
Ed Sutherland
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
Entrepreneur
December 2008
Lindsay Holloway
A Leash on Your Laptop New tracking software monitors your missing laptop's whereabouts. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
BusinessWeek
March 25, 2010
Rich Jaroslovsky
Should the Cloud Be Your Safety Deposit Box? Software that lets you share important financial data with a spouse or an heir may test your faith in Web 2.0 mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
InternetNews
April 23, 2010
Laptop Theft Exposes Data on 3,500 Patients Some people don't seem to learn. The latest lost laptop comes to you courtesy of a Massachusetts-based neurosurgeon whose unencrypted laptop was stolen, putting more than 3,500 patients' most sensitive data at risk. mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
InternetNews
June 6, 2009
Alex Goldman
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. mark for My Articles similar articles
InternetNews
December 14, 2006
Ed Sutherland
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? mark for My Articles similar articles
InternetNews
August 5, 2010
Another Laptop Theft Exposes 21K Patients' Data Philadelphia's Thomas Jefferson University Hospital is in the process of notifying more than 21,000 patients that a stolen laptop has exposed some of their most sensitive personal information. mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
Entrepreneur
March 2004
Amanda C. Kooser
Tech Buzz 3/04 Voice control, protecting your laptop and more. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
InternetNews
May 17, 2010
Data Breach Tags N.M. Medicaid Patients Nearly 10,000 participants in New Mexico's Medicaid program had their personal information compromised after a car with a laptop in the trunk was stolen in Chicago. mark for My Articles similar articles
InternetNews
December 4, 2009
Laptop Thief Nabs Hospital Patient Data It's the latest incident in which a lost or missing laptop leads to criminals gaining access to sensitive data. mark for My Articles similar articles
Inc.
August 2008
Michael Fitzgerald
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. mark for My Articles similar articles
CIO
July 16, 2008
Meridith Levinson
Everyone Works at Home at Chorus, Part Two In this story, the second of three parts, a small software company establishes work-at-home policies and figures out how to provide remote tech support. Part one focused on the IT infrastructure needed to support telecommuters. mark for My Articles similar articles
InternetNews
September 13, 2007
Andy Patrizio
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." mark for My Articles similar articles
PC World
December 20, 2006
Kirk Steers
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. mark for My Articles similar articles
InternetNews
September 13, 2010
CCNY Student Data Exposed in Laptop Heist Some 7,000-plus students attending the City College of New York are learning that some of their most sensitive personal information was exposed when a school laptop was stolen last month. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
PC Magazine
September 20, 2006
Russell Morgan
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Laptop Theft Loses 1M Social Security Numbers The Oklahoma Department of Human Services reported that a laptop was stolen from one of its employees. The cost of the loss is likely going to be sky-high. mark for My Articles similar articles
Military & Aerospace Electronics
March 2006
John Keller
Military Users Are Giving Second Thoughts to the Needs for Ruggedized Laptop and Notebook Computers U.S. military portable computer users have come to realize that laptop computers are repositories of often-irreplaceable and sensitive data, giving them reason to reconsider buying specially designed ruggedized laptops. mark for My Articles similar articles
T.H.E. Journal
April 2005
Philip Lombardi
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
InternetNews
January 13, 2010
Your Laptop's Been Stolen. What Should You Do? Strategies abound for preventing or at least minimizing the impact of a stolen laptop. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
Entrepreneur
November 2006
Amanda C. Kooser
Identify Yourself How will increasingly sophisticated biometric technologies affect you? mark for My Articles similar articles