Archive

Archive for May, 2005

Top 10 Security Checklist for SOHO Wireless LANs

May 24th, 2005
Comments Off on Top 10 Security Checklist for SOHO Wireless LANs

Corporations, government agencies, the military, and enterprises—in fact all medium-to-largescale wireless LANs have a different set of security requirements from the wireless LAN used in your home or in small offices. Enterprise wireless security requires advanced mutual authentication and strong encryption solutions.
Read more…

Articles

worried about identity theft?

May 23rd, 2005
Comments Off on worried about identity theft?

WOODLAND HILLS, Calif. (May 23, 2005) – Stealth Ideas Inc (www.stealthsurfer.com), a manufacturer of computer peripherals designed to protect consumer privacy, today released the much-awaited upgrade to last year’s hot personal security device. StealthSurfer II, the fully redesigned, thumb-sized flash storage drive now includes on-board integration with Anonymous Surfing™, an identity protection program from Anonymizer®. By combining the local privacy features of the StealthSurfer with IP masking of Anonymous Surfing, StealthSurfer II is the most robust privacy and identity protection tool available on the market.
Read more…

Releases

Identity Theft Fears most US Citizens

May 23rd, 2005
Comments Off on Identity Theft Fears most US Citizens

Despite a recent push in identity theft prevention awareness by major organizations and government agencies, 75 percent of US citizens believe that their identity is no more secure than one year ago. Consumers do not believe current and traditional methods of security are good enough to protect them against identity theft.
Read more…

Articles

VoIP: Telecom Then, Telecom Now

May 23rd, 2005
Comments Off on VoIP: Telecom Then, Telecom Now

In order to clearly understand the next generation of telephone technology, let’s go back a step to how traditional telephone networks work. An analog telephone line is installed from the telephone company and the customer is issued a telephone number.
Read more…

Articles

The Battle with Spyware and Adware

May 23rd, 2005
Comments Off on The Battle with Spyware and Adware

Less than a year ago, the National Cyber Security Alliance reported that 80 percent of consumers had adware or spyware on their home PCs. Further information reveals that spyware is on the rise in industries as well, affecting offices, hospitals, and financial institutions.
Read more…

Articles

Why Offshore Outsourcing Projects Fail

May 20th, 2005
Comments Off on Why Offshore Outsourcing Projects Fail

We have all heard of outsourcing projects, particularly those that involve offshore, that have failed. Some recent examples of failed offshore outsourcing have made headlines and become hotly debated among opponents and supporters of outsourcing.
Read more…

Articles

it observer – ncipher helps combat phishing attacks with chip and pi

May 20th, 2005
Comments Off on it observer – ncipher helps combat phishing attacks with chip and pi

Banka Koper deploys nCipher payShield as part of MasterCard’s Chip Authentication Program (CAP) to give customers a simple and secure means for online banking and credit card authentication
Read more…

Releases

Information Security Issues for Instant Messaging

May 20th, 2005
Comments Off on Information Security Issues for Instant Messaging

In today’s fast-moving business environment, Instant Messaging offers a number of advantages, such as sending e-mails, transfer file etc. Because IM uses Peer-to-Peer technology to enable direct communication, it can allow hackers to bypass firewalls and access IT systems and has the potential to threaten your entire network with a whole raft of security attacks.
Read more…

Articles

UK Businesses Suffer from Email Failures

May 19th, 2005
Comments Off on UK Businesses Suffer from Email Failures

Email failure is costing UK businesses more that 1bn a year and impacting on reputation and profits, according to a research publisher this week. Further more, e-mail failure is likely to grow due to increase dependency of marketer on e-mails as a preferred communication form.
Read more…

Articles

The Evolution of IT Training Strategies

May 19th, 2005
Comments Off on The Evolution of IT Training Strategies

Since 2000, IT companies and IT departments within corporations have undergone significant reductions in spend across the board – leaving companies to revamp training strategies. There are essentially three forms of training strategies under discussion each with its own advantages and disadvantages for not only the consultant/employee but also for the company: instructor-led training, e-learning and mentoring.
Read more…

Articles