MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Financial Advisor
September 2004
David L. Lawrence
Finding Profit In Written Policies And Procedures The exercise of writing the procedures for a financial practice can reveal ways to trim the process, refine your workflow systems and make things work better in a practice. Freeing up time and that of employee(s) can save money. mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 4 1999
Susan Athey
Computer Use Policies at Major U.S. Public Universities Protection of an organization's resources (assets) is a key responsibility of management. This is especially true in a public university. An assortment of issues affects proper management of computer resources... mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
Bank Systems & Technology
July 5, 2004
Peggy Bresnick Kendler
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. mark for My Articles similar articles
CIO
November 11, 2009
Russell Beck & Matt Karlyn
IT Security: A Practical Approach to Protecting Trade Secrets Trade secret protection depends upon close cooperation between IT security and your company's lawyers. mark for My Articles similar articles