Physical and environmental protection July 2002, Security Ask any person who has had his or her laptop stolen, and they will tell you that physical security of data is as vital as virtual security of data.
It is two o'clock, Wednesday afternoon, emotions are ...
Metropolitan storage farms - the key to improved business continuance May 2002, Storage One of the key elements of business continuance is the ability to maintain critical business operations by mitigating the effects of downtime. This translates into recovering and restoring computing operations ...
Well-defined security policies essential December 2001 It is not enough merely to secure one's IT infrastructure - telephone systems, physical security and social engineering must also all be considered as part of a comprehensive security policy. "The best ...
Access all areas September 2001 The HR issue of security compliance can and should also supplement any technical safeguards as well motivated staff are less likely to transgress either intentionally or unintentionally
New package to track IT assets June 2001 Local company, FrontRange Solutions (FRS), recently announced the launch of HEAT Asset Tracker, aimed at keeping track of a company's IT investments. FRS is an international supplier of software for automating ...
Network user interface May 2001, Infrastructure The WJ-NT104 from Panasonic is fully equipped with image capture, JPEG and HTTP server functions. It can provide multiple site monitoring which can be conducted from multiple locations (PC), enabling ...
Price alteration: the latest crisis for online shopping May 2001 e-commerce has received a body blow with the revelation that any user with a browser can alter prices of goods online and effectively get them for a steal.
Ian Melamed, Chief Technology Officer of Satellitesafe, ...
Secure m-commerce applications March/April 2001 Comverse, a supplier of software and systems enabling network-based enhanced services, has announced the availability of a solution for end-to-end multi-access security for wireless Internet services.
The ...
MasterCard successfully processes during Leap Year Day 2000 March/April 2000 MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone.
Because of concerns that computers might misinterpret the value of '02/29/00', ...
Data, not hardware, is a company's most valuable asset March/April 2000 During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.
Just another South African crime statistic, one may ask?
"No, almost ...
28 frightening IT facts July '99 The recently released 1999 CSI/FBI Computer Crime Survey details what 521 companies from various industries and of various sizes are doing to secure their computer systems. The results highlight why security ...