• Grid View
  • List View
  • IT Best Practices - IT Security in Banking, Finance, and Insurance

    IT Security in Banking, Finance, and Insurance

    This article provides key findings for the banking, finance, and insurance industry from our 2002 report, IT Security, Perceptions, Awareness, and Practices. Acces to the full report is also provided.

    December, 2002

  • IT Best Practices - IT Security in Manufacturing Firms

    IT Security in Manufacturing Firms

    This article provides key findings for the manufacturing industry from our 2002 report, IT Security, Perceptions, Awareness, and Practices. Acces to the full report is also provided.

    November, 2002

  • IT Best Practices - Controlling IT Security Costs

    Controlling IT Security Costs

    Developing an effective security management process is key to controlling costs and protecting your IT environment. This article provides key points for choosing between using integrated functionality in network devices and using a specialized functional appliances.

    October, 2002

  • IT Best Practices - Checklist for Evaluating E-Commerce Security

    Checklist for Evaluating E-Commerce Security

    Numerous successful website violations demonstrate e-commerce’s vulnerability to security threats. A successful security program necessitates a continuing cycle of evaluating, improving, and rebuilding defenses. This article provides a checklist to assist in developing a cost-effective policy that takes into account all factors required for success. (3 pp.)

    August, 2002

  • IT Best Practices - Apply Countermeasures to Protect IT Security Now (August 2002)

    Apply Countermeasures to Protect IT Security Now (August 2002)

    Many IT managers worry about the vulnerability of their systems, but their attempts to improve protection are often hampered by budgetary and administrative concerns. Any security measure will inconvenience users and the organization to some degree. Past ineffectiveness of protective applications often results in a cynical user community and a hard sell to management when attempts are made to add new security protection.

    August, 2002

  • IT Best Practices - Achieving a Positive ROI for IT Security

    Achieving a Positive ROI for IT Security

    Understand your core IT security issues and develop an ROI model that will save you time and money and strengthen your IT environment.

    July, 2002

  • IT Best Practices - Checklist for Reporting a Computer Crime

    Checklist for Reporting a Computer Crime

    This article provides a checklist of practical steps to follow in the event that your systems are hacked or accessed by an unauthorized party. Actions include how to contact law enforcement, information to gather to assist in the investigation, and information to gather to determine damages. (2 pp.)

    May, 2002