Tuesday, December 11, 2007

Reducing employee turnover: The STCC case study, Part 1

Security Strategies Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Reducing employee turnover: The STCC case study, Part 1

M. E. Kabay By M. E. Kabay
One of the big threats to the security of an organization is the sudden departure of a key employee. Guest author Stanley Jamrog explains how his IT department works to retain employees and keep them productive. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.


SPONSORED BY WORKSHARE
rule

Is your organization at risk of data leaks and intellectual property theft?
Learn how today's organizations are reducing risk! Eliminate compliance violations by blocking visible data. Strengthen compliance control by monitoring and enforcing policies. Control policies enterprise-wide using a single, centralized management console. Click here to view now.

rule
RELATED NEWS:

Network skills in high demand, 12/04/2007 IT professionals proficient in networks could find themselves in demand next year, because a majority of CIOs polled cite network administration ...

Live Chat: Microsoft/Cisco cert tips revealed Get your cert questions answered by cert guru Patrick Regan, author of over a dozen books. Today, Dec. 11, 2-3 p.m. EST. No registration required.

ITIL takes on security management role, 12/06/07 Long touted for streamlining processes and reducing operating costs, the ITIL best-practices framework also helps mitigate enterprise risk, say its adopters.

Microsoft Vista's IPv6 raises new security concerns, 12/06/07 Members of the Internet engineering community have raised several new security concerns about Teredo, a mechanism for sending IPv6 traffic over IPv4 networks that comes turned on by default in Microsoft’s Vista software.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY WORKSHARE
rule

Is your organization at risk of data leaks and intellectual property theft?
Learn how today's organizations are reducing risk! Eliminate compliance violations by blocking visible data. Strengthen compliance control by monitoring and enforcing policies. Control policies enterprise-wide using a single, centralized management console. Click here to view now.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/11/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Open source software targets math programs
  3. Network coding: networking's next revolution?
  4. Cyberattack on national labs
  5. The nine worst Microsoft products
  6. Former Microsoft employee charged
  7. 2007 Cool Yule Tools gift guide
  8. Nortel thrashes Cisco wireless market share
  9. Cisco warns of bug in desktop software
  10. Vista's IPv6 raises new security concerns


TOP 100 OF 2007


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment