Search This Blog

Tuesday, January 20, 2009

Users don't get it (but it's human nature)

Employees continue to contribute to data leakage
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by MessageLabs
rule

Blocking Spam at Least 99% of the Time
By taking a multi-layered approach to fighting spam you stand the best chances of keeping unwanted emails off your systems. Realize a 99% spam capture rate with near-zero false positives with a robust anti-spam email service. Download this whitepaper to get all of the details today.

rule

Spotlight Story
Users don't get it (but it's human nature)

M. E. Kabay By M. E. Kabay
"Why don't employees just PAY ATTENTION and FOLLOW OUR RULES?!?" Doesn't that sound like the cry from the heart of security managers the world 'round? Well, there's hope. Follow me today and next time on an excursion into current research findings and I'll show you a simple principle that will change the way you implement security awareness. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Podcast: Cisco's data leakage study; Aruba software improves throughput and reliability Cisco study of 2,000 professionals finds changing work environments increase common data leakage mistakes; Aruba Networks has unveiled a new release of software that’s designed to improve wireless LAN throughput and reliability. (9:16)

Data leakage prevention on a budget Now that larger companies are entering the DLP space, my company wants me to look into the technology. I've noticed it's quite pricey, especially with service added. Can DLP be done on a budget?

Data leakage prevention: Hot technology for 2008 How hot is the data leakage prevention market? Well, if the big boys like Cisco, Symantec, McAfee and Trend Micro are snapping up DLP start-ups to the tune of $1.6 billion in 2006, there must be a reason.

Top 10 ways collaboration, mobility amplify data leakage dangers: Cisco study Numerous behavioral risks taken by employees in increasingly distributed and remote locations can lead to the loss of corporate information, according to a study commissioned by Cisco.

Data-leak prevention and encryption: Tools that can work together Data leakage incidents generally occur when workers are performing everyday tasks, such as sending e-mail that inadvertently contains sensitive information. When this happens, data-leak prevention (DLP) products -- in ...

Six worst Internet routing attacks Here's our list of the biggest security incidents involving the Internet's core routing protocol, the Border Gateway Protocol. Some of these incidents were attacks; others were accidental misconfigurations. But all of them disrupted traffic to Web sites or entire networks because of incorrect routing messages being propagated across the Internet through BGP.

'Amazing' worm attack infects 9 million PCs Calling the scope of the attack "amazing," security researchers at F-Secure Friday said that 6.5 million Windows PCs have been infected by the "Downadup" worm in the last four days, and that nearly 9 million have been compromised in just over two weeks.

The Security Laugh Metric Individuals such as Pete Lindstrom and groups like securitymetrics have done a great job creating awareness of the need for security metrics. In fact, nearly a thousand security metrics can be found in the book Complete Guide to Security and Privacy Metrics for those who are metrics obsessed.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by MessageLabs
rule

Blocking Spam at Least 99% of the Time
By taking a multi-layered approach to fighting spam you stand the best chances of keeping unwanted emails off your systems. Realize a 99% spam capture rate with near-zero false positives with a robust anti-spam email service. Download this whitepaper to get all of the details today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.

 

01/20/09

Today's most-read stories:

  1. Microsoft layoffs could come next week
  2. U.S. plots major upgrade to Internet router security
  3. Nortel's bankruptcy: A long time coming
  4. FAQ: What's in store for Nortel
  5. The presidential portrait goes digital
  6. Why Windows 7 will crush Linux
  7. Worm infects 1.1M Windows PCs in 24 hours
  8. Microsoft/Nortel relationship again under microscope
  9. Windows 7 on Netbooks: Does Linux stand a chance?
  10. How Obama might get his way on BlackBerry


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: