-
IT Security in Banking, Finance, and Insurance
This article provides key findings for the banking, finance, and insurance industry from our 2002 report, IT Security, Perceptions, Awareness, and Practices. Acces to the full report is also provided.
December, 2002
-
IT Security in Manufacturing Firms
This article provides key findings for the manufacturing industry from our 2002 report, IT Security, Perceptions, Awareness, and Practices. Acces to the full report is also provided.
November, 2002
-
Controlling IT Security Costs
Developing an effective security management process is key to controlling costs and protecting your IT environment. This article provides key points for choosing between using integrated functionality in network devices and using a specialized functional appliances.
October, 2002
-
Checklist for Evaluating E-Commerce Security
Numerous successful website violations demonstrate e-commerceâs vulnerability to security threats. A successful security program necessitates a continuing cycle of evaluating, improving, and rebuilding defenses. This article provides a checklist to assist in developing a cost-effective policy that takes into account all factors required for success. (3 pp.)
August, 2002
-
Apply Countermeasures to Protect IT Security Now (August 2002)
Many IT managers worry about the vulnerability of their systems, but their attempts to improve protection are often hampered by budgetary and administrative concerns. Any security measure will inconvenience users and the organization to some degree. Past ineffectiveness of protective applications often results in a cynical user community and a hard sell to management when attempts are made to add new security protection.
August, 2002
-
Achieving a Positive ROI for IT Security
Understand your core IT security issues and develop an ROI model that will save you time and money and strengthen your IT environment.
July, 2002
-
Checklist for Reporting a Computer Crime
This article provides a checklist of practical steps to follow in the event that your systems are hacked or accessed by an unauthorized party. Actions include how to contact law enforcement, information to gather to assist in the investigation, and information to gather to determine damages. (2 pp.)
May, 2002