Thursday, December 13, 2007

Reducing employee turnover: The STCC case study, Part 2

Security Strategies Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Reducing employee turnover: The STCC case study, Part 2

M. E. Kabay By M. E. Kabay
If your IT group suffers from loss of trained personnel, demoralized and frustrated staff members, low productivity, poor customer relations or even outright sabotage of policies or systems, use STCC as a basis for comparison and analysis. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.

MORE STORIESARROW


SPONSORED BY QUALYS
rule

On Demand Security Risk and Compliance Management Solutions
Learn the benefits of on demand security risk and compliance management through this informative microsite. Download, view and listen to this compilation of whitepapers, webcasts, and videos to learn how to more accurately discover vulnerabilities. Find out how to ensure regulatory compliance and prioritize remediation. Click here to visit our microsite today!

rule
RELATED NEWS:

U.S. Secret Service busts $5.7 million Cisco scam on eBay California's Orange County Register is reporting that the U.S. Secret Service has busted a $5.7 million scam on eBay selling illegally obtained Cisco replacement parts.

Scary tech stories: How dangerous user behavior puts networks at risk, 12/10/07 IT executives have always had to protect their networks from external attacks, but with data breaches increasing in frequency, more network and security managers are realizing negligent user actions could be the cause of many of their security nightmares.

NBA: Your last line of defense, 12/10/2007 There's a new weapon in the security arsenal that monitors network traffic and issues real-time alerts when it spots unusual or suspicious behavior ...

Who's got the fastest firewall?, 12/10/2007 When we tested firewall performance as part of in our UTM firewall test we focused on how well the products would push inspected packets along with ...

Data breaches, regulations fueling data encryption adoption, 12/10/2007 Although data encryption adds cost and complexity, business and government sectors are becoming wedded to it -- even though at times it's like an ...

CIOs with MBA degrees want to jump to other jobs, 12/01/07 Some CIOs with MBA degrees see IT as a stepping stone to glory in another C-level role, according to an exclusive survey by CIO.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY QUALYS
rule

On Demand Security Risk and Compliance Management Solutions
Learn the benefits of on demand security risk and compliance management through this informative microsite. Download, view and listen to this compilation of whitepapers, webcasts, and videos to learn how to more accurately discover vulnerabilities. Find out how to ensure regulatory compliance and prioritize remediation. Click here to visit our microsite today!

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/13/07

TODAY'S MOST-READ STORIES:

  1. Payment processor accused of taking millions
  2. AT&T employees sound off on telework cuts
  3. Microsoft pulls plug on potty-mouth Santa
  4. Scary tech stories
  5. Top six Cisco acquisitions of 2007
  6. The nine worst Microsoft products
  7. 2007 Cool Yule Tools gift guide
  8. Review: Who's got the fastest firewall?
  9. AT&T expands reach of 40G backbone
  10. Wireless hits crossroads, Part 2


TOP 100 OF 2007


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment