Tuesday, October 20, 2009

Security flubs cost ChoicePoint additional $275,000

Secure telework without a VPN; Going Shopping? Cisco Could Be Watching You
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Trend Micro
rule

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.

Read More

rule

Spotlight Story
Security flubs cost ChoicePoint additional $275,000

Not that a $275,000 fine will make your personal data any more secure but data brokers ChoicePoint today agreed to bolster yet again its data security and pay $275,000 to settle Federal Trade Commission charges it failed on the first go-around to implement a court-ordered comprehensive information security program. ChoicePoint is now required to report to the FTC - every two months for two years - detailed information about how it is protecting the breached database and certain other databases and records containing personal information. Read full story

Related News:

Secure telework without a VPN
Toronto brokerage firm Octagon Capital ended up choosing an unusual hardware-and-cloud service from Route1 to secure its telework environment.

Going Shopping? Cisco Could Be Watching You
Ahhhh, Physical Security! It usually constitutes one of the major weak links in IT security's armor. All you have to do is look at the demand for Network Access Control (NAC) to be convinced. Most don't realize that Cisco has been in the physical security business for a while now, mostly in the IP Video Surveillance (IPVS) sector. Cisco sells HD IP Video Cameras, Video management systems, DVRs,...

Mozilla blocks Microsoft's sneaky Firefox plug-in
Mozilla has blocked the Microsoft-made software -- an add-on dubbed ".NET Framework Assistant" and a plug-in named "Windows Presentation Foundation" -- that had put Firefox users at risk from attack.

CIA Building Secure Cloud-based System
The secretive CIA, one of the U.S. government's strongest advocates of cloud computing, believes an internal cloud can make the agency's IT environments more flexible and secure.

Microsoft issues first Windows 7 patches
Microsoft's massive security update last week included patches for nine Windows 7 vulnerabilities, far fewer than were issued for Windows Vista and Windows XP.

Scams & shams: The trouble with social networks
It's hard to understand who in their right mind would want to incur the wrath of "Triple H," the intimidating superstar of professional wrestling. But when a poser created a fraudulent MySpace account in Triple H's name, it wasn't the wrestler that the perpetrator had to contend with.

How hackers find your weak spots
While there are an infinite number of social engineering exploits, typical ones include the following:

Week in security: NASA fails, Microsoft sneaks, Zeus phishing, cyber security fiction?
A look back at the week's biggest security-related news stories.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

ITIC Research Paper: VIPRE Takes Bite out of Bloatware
The remedy to bloatware is a better, more efficient and economical product that is specifically engineered to scan, detect and remove myriad security threats without impacting performance. Read this white paper to learn how a new antivirus technology platform reduces bloat and high resource usage.
Learn More


Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Webcast. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.
Click here to learn more.

 

October 20, 2009

MOST-READ STORIES

  1. Verizon fires shots across iPhone's bow with Droid smartphone
  2. Mozilla blocks Microsoft's sneaky Firefox plug-in
  3. 10 things you need to know about Windows 7
  4. Ethernet everywhere!
  5. Symantec calls 'SpywareGuard', 'Antivirus' top scareware threats
  6. The 'Net's most heinous hoaxes
  7. Missing dot drops Sweden off the Internet
  8. Husband, wife team arrested for allegedly stealing from Cisco
  9. How to royally foul-up an IT outsourcing project
  10. The Internet has shifted under our feet

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment