MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
June 22, 2010
SMBs Starting to Make Security a Top Priority Now that the economy is slowly turning around a bit, small and midsized businesses are starting to spend the money and dedicate the resources necessary to secure customer data. mark for My Articles similar articles
Food Processing
September 2013
Anthony Hernandez
Protecting Your Data in a Mobile World If food companies adopt a bring-your-own-device approach, they need to establish clear policies and implement IT security controls. mark for My Articles similar articles
InternetNews
August 5, 2010
File Monitoring Key to Enterprise Security Employees are responsible for more data breaches than outside hackers and security software experts say companies must do a better job of supervising where and how employees access files. mark for My Articles similar articles
InternetNews
December 14, 2010
Lisa Phifer
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. mark for My Articles similar articles
Wall Street & Technology
February 25, 2008
Melanie Rodier
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening. mark for My Articles similar articles
InternetNews
December 8, 2010
Mobile Users Let Down Guard During Holidays New survey reveals that despite warnings and media coverage, most smartphone users will still take unnecessary risks during the holidays. mark for My Articles similar articles
Financial Advisor
December 2004
David J. Drucker
Business Mobility Gets Unwired The concept of "upward mobility" is taking on a new meaning, suggests a report by TowerGroup, "Mobilizing the Financial Services Enterprise: Business Mobility Gets Unwired." mark for My Articles similar articles
InternetNews
November 6, 2009
Laptop Heist Exposes Doctors' Personal Data Another stolen laptop puts thousands of people's personal data at risk but this time it's the caregivers - not the patients - who are at risk. mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
Insurance & Technology
May 18, 2004
Paul McDougall
Laptop Theft Compromises Data GMAC Financial Services customers have personal data stolen. mark for My Articles similar articles
InternetNews
October 29, 2010
Apple Storms Into Mobile Phone Top 5 iPhone demand pushes company into top tier of mobile phone manufacturers, a sign of even better things to come for smartphone vendors. mark for My Articles similar articles
InternetNews
January 14, 2010
Mobile Security Software Set to Take Off Analyst firm ABI Research projects boom times ahead for wireless security products as smartphones become more popular on-ramps to the Internet. mark for My Articles similar articles
InternetNews
December 1, 2009
McAfee Tackles Portable Device Threats Security software maker looks to lock down portable USB drives and mobile devices. mark for My Articles similar articles
InternetNews
December 4, 2009
Laptop Thief Nabs Hospital Patient Data It's the latest incident in which a lost or missing laptop leads to criminals gaining access to sensitive data. mark for My Articles similar articles
CIO
June 29, 2011
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. mark for My Articles similar articles
InternetNews
January 17, 2007
Ed Sutherland
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. mark for My Articles similar articles
PHONE+
February 26, 2010
Borg & Patil
Enterprise Mobile Strategies Mature in 2010 As organizations enter 2010, it is no longer sufficient to simply provide mobile devices to employees and expect concrete business value to somehow magically appear. mark for My Articles similar articles
PC World
October 2004
Tom Spring
Tiny Drives With Big Brains Having basically replaced floppy disks as the portable media of choice for small amounts of PC data, USB flash drives are pursuing more widespread adoption. mark for My Articles similar articles
InternetNews
March 3, 2010
Financial Services Firms Ripe for Data Attacks Study finds porous data protection policies and technologies are putting millions of customers - and their assets - at risk. mark for My Articles similar articles
InternetNews
July 23, 2010
Smartphones Gaining Biometric Security Enterprises concerned about smartphone security will soon have a new option: biometric fingerprint recognition. mark for My Articles similar articles
InternetNews
August 2, 2006
David Needle
Stakes Rise in Notebook Safety Increased mobility puts more data at risk, which has vendors scrambling. mark for My Articles similar articles
PHONE+
Mike Rosen
Targeting Mobile and Distributed Workforces For many small businesses looking to gain a competitive advantage, mobility is now considered a necessity. mark for My Articles similar articles
InternetNews
September 22, 2006
Roy Mark
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. mark for My Articles similar articles
InternetNews
November 5, 2009
Analyst: iPhone Gearing Up for Enterprise Growth A report out this week details why the iPhone is poised to make big gains in the enterprise. mark for My Articles similar articles
InternetNews
October 19, 2009
Memo to IT: Can You Support My iPhone, Pre? BoxTone's mobile management software helps enterprise IT accommodate influx of personal smartphones. mark for My Articles similar articles
InternetNews
March 18, 2008
David Needle
Sybase Broadens iPhone's Enterprise Appeal Sybase today extended its iAnywhere Suite to support the iPhone. mark for My Articles similar articles
InternetNews
February 13, 2007
Ed Sutherland
FBI Laptops Make Most Wanted List Audit reports lost and stolen FBI laptops included computers in anti-terror and counter-spy programs. mark for My Articles similar articles
InternetNews
June 29, 2010
What IT Doesn't Know Can Hurt Everyone: Study Between iPhones, iPads and Twitter, the prevalence of consumer devices and content in the enterprise is largely underestimated by IT managers and puts corporate data at risk. mark for My Articles similar articles
CIO
September 8, 2009
David F. Carr
5 Things You Need to Know About Smartphone Security Smartphones are easier to lose than laptops. Here are some tips to keep your corporate data safe. mark for My Articles similar articles
CIO
September 28, 2011
Gary Beach
Enterprise Mobile: 7 Things CIOs Need to Do Now CIOs at a conference on enterprise mobility say that now is the time to throw significant investment into mobile. mark for My Articles similar articles
InternetNews
September 16, 2009
Michelle Megna
Enterprise IT Face Mobile Device Dilemma Many employees use their personal smartphones for business, which compromises corporate security, according to new study. mark for My Articles similar articles
CFO
July 15, 2009
Josh Hyatt
Taking It Personally As the line blurs between consumer and corporate technology, companies may have to rethink how they equip mobile workers. mark for My Articles similar articles
InternetNews
May 14, 2009
Alex Goldman
Sybase Befriends Samsung, Symbian, Amazon Delivering applications to mobile devices requires Sybase to work with everyone, from device makers to application developers, proprietary and open source. mark for My Articles similar articles
Popular Mechanics
August 4, 2008
Brian Krebs
For Olympic Travelers, Concerns Over Gadget Surveillance in China IT consultants and encryption experts are preparing high-profile Olympic attendees and tourists for what's shaping up to be a high-tech headache in Beijing. mark for My Articles similar articles
IndustryWeek
July 22, 2009
Steve Minter
Taking Charge of Mobile Workforce Costs Organizations can improve profitability by 1 to 4% simply by making employee mobility a strategic priority. mark for My Articles similar articles
InternetNews
April 23, 2009
Alex Goldman
Hefty Price Tag for Lost Laptops: Nearly $50,000 Left your $2,000 notebook PC in a taxi? The real cost to your business could be far, far higher. mark for My Articles similar articles
CRM
December 13, 2013
Tom Wilde
Leverage Video to Empower a Field Work Force Used correctly, this medium can pay off big for your business. mark for My Articles similar articles
Bank Director
2nd Quarter 2009
Karen Epper Hoffman
Beware the Inside Job In this time of unprecedented layoffs, massive budget cuts, and related merger activity, banks need to be careful of the security threat that lies within their own organization. mark for My Articles similar articles
InternetNews
October 4, 2004
Sean Michael Kerner
Sybase Eyes New Market for Mobile Integration Sybase this morning unveiled two new products as part of its efforts to make mobile application development and integration easier. mark for My Articles similar articles
PC World
June 2006
Andrew Brandt
This Stolen Laptop Will Self-Destruct in 5 Seconds When a device is in the wrong hands, protecting the data in it is no longer Mission: Impossible. mark for My Articles similar articles
InternetNews
February 14, 2011
Dell Makes Mobile Device Management Play The broad new portfolio of services from Dell includes mobile security and the creation and deployment of enterprise apps. mark for My Articles similar articles
The Motley Fool
September 21, 2010
Anders Bylund
Google Takes a Swing at Security A brilliant new security feature suddenly makes cloud-based tools trustworthy. mark for My Articles similar articles
InternetNews
June 27, 2006
Tim Scannell
Sybase Maps For Mobility Sybase today released a mobility roadmap that packs all of its e-mail, device management and security applications into one strategic suitcase for mobile-minded enterprises. mark for My Articles similar articles
CIO
February 24, 2010
John Brandon
Why You Need a Smartphone Application Strategy It's only a matter of time before employees want to use their smartphones for everything. So CIOs need to start thinking about smartphone apps as part of their enterprise application strategy. mark for My Articles similar articles
PHONE+
May 19, 2009
AT&T Adds More Netbooks, Expands Program AT&T will make the mini laptops available coast-to-coast. mark for My Articles similar articles
InternetNews
November 19, 2009
Web 2.0 Makeover Poses Big Risks for Gov't: Study Seventy-nine percent of government IT honchos surveyed say popular collaboration tools and cloud-computing options will put even more data at risk. mark for My Articles similar articles
InternetNews
August 18, 2009
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report. mark for My Articles similar articles
Investment Advisor
March 1, 2011
Lewis Schiff
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. mark for My Articles similar articles
CIO
June 14, 2011
Gary Beach
The Dawning of the Age of Mobility Every 15 years, a big technology shift changes IT forever. Mobility will define the next era. mark for My Articles similar articles