MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Investment Advisor
March 1, 2011
Lewis Schiff
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
InternetNews
December 14, 2006
Ed Sutherland
Boeing Grappling With Data Theft Hundreds of thousands at Boeing get free credit checks after yet another laptop slipped away. Is it enough to prevent ID theft? mark for My Articles similar articles
InternetNews
August 30, 2006
Clint Boulton
AT&T to Offer Credit Checks After Data Hack AT&T will pay for credit monitoring services after 19,000 credit card numbers were stolen. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
T.H.E. Journal
August 2006
Doug Gale
Can This Virus Be 'Rooted' Out? A new kind of hard-to-detect malware is increasing our vulnerability to hackers and creating headaches for makers of antiviral software. mark for My Articles similar articles
Entrepreneur
April 2004
Bender, Clancy, & Kooser
Secure Horizons Are worries about spam, viruses and hackers keeping you up at night? Our Internet security guide will help you protect the future of your business so you can sleep soundly. mark for My Articles similar articles
Investment Advisor
May 2007
Joni Youngwirth
Risk Management--for Yourself Think you've got a handle on risks to your financial advisory practice? Think again. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
InternetNews
April 23, 2009
Alex Goldman
Hefty Price Tag for Lost Laptops: Nearly $50,000 Left your $2,000 notebook PC in a taxi? The real cost to your business could be far, far higher. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
InternetNews
September 27, 2006
Ed Sutherland
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. mark for My Articles similar articles
InternetNews
January 13, 2010
Your Laptop's Been Stolen. What Should You Do? Strategies abound for preventing or at least minimizing the impact of a stolen laptop. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles
PC World
December 20, 2006
Kirk Steers
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
InternetNews
April 5, 2007
Roy Mark
IRS Audits Self Into Data-Theft Hot Seat New audit finds IRS with 500 missing or stolen laptops, some with unencrypted taxpayer confidential information. mark for My Articles similar articles
InternetNews
January 9, 2007
Ed Sutherland
Retiree Data Lost in Laptop Theft Laptops are stolen from Manhattan-based Towers Perrin offices. Retirees are being urged to monitor credit records. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
InternetNews
June 22, 2006
Clint Boulton
Two FTC Laptops Stolen The Federal Trade Commission today said two if its attorneys' laptops containing the personal information of 110 people were stolen from a locked vehicle last week. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. mark for My Articles similar articles
PC World
July 2, 2002
Andrew Brandt
Klez: The Virus That Won't Die? Brace yourself for another round: A variant of the resilient worm is wriggling alive this week. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
June 6, 2009
Alex Goldman
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Insurance & Technology
May 18, 2004
Paul McDougall
Laptop Theft Compromises Data GMAC Financial Services customers have personal data stolen. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
PC Magazine
June 21, 2006
Matthew D. Sarrel
Safety in Layers A successful antivirus strategy is one that stacks security. mark for My Articles similar articles
T.H.E. Journal
April 2005
Philip Lombardi
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC World
May 28, 2002
Frank Thorsberg
Worms Crawl Toward Instant Messaging IM users should become more security-conscious as IM spreads across devices and invites viruses... mark for My Articles similar articles
CIO
June 1, 2001
Sarah D. Scalet
Outbreak In 2000, computer viruses caused more than $17 billion in damage to businesses worldwide. Read one CIO's story to prevent an invasion in your company... mark for My Articles similar articles
InternetNews
August 2, 2006
David Needle
Stakes Rise in Notebook Safety Increased mobility puts more data at risk, which has vendors scrambling. mark for My Articles similar articles
PC World
August 2004
Anne Kandra
Keep Your Hands on Your Handhelds How to prevent laptops and other portable devices from being stolen or lost. mark for My Articles similar articles