Description: After more than two months of refusing to reveal the size and scope of its data breach, TJX Companies Inc. is finally offering more details about the extent of the compromise. Source: Jaikumar Vijayan, Computer World Date: 3/29/2007 Link: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014782 Discussion Questions: What advice would you give managers about increasing awareness… Read more »
Posts Tagged: IT Security
Description: The personal information of about 1.1 million active-duty military personnel, 430,000 members of the National Guard and 645,000 members of the Reserves, was stolen in the recent theft of computer data from the Department of Veterans Affairs, the agency announced Tuesday. The agency previously said… Read more »
Description: “This is the largest security breach we’ve ever had worldwide,” said Avivah Litan, an analyst with research firm Gartner. “There was a case at CardSystems where 40 million records were exposed, but this one looks like it was a case where the information was stolen.” Source: Dawn Kawamoto, Cnet Date:… Read more »
Description: 11:03 minutes. YouTube video about importance of IT to criminal investigations. Basic best practices, security 101. Source: YouTube Date: 1/1/2007 Link: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related Discussion Questions: How can IT facilitate forensics investigations?
Description: Article listing the top 10 security surprises faced by nine executives running top software security programs. Source: Gary McGraw, Brian Chess, and Sammy Migues, Informit Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/Informit_Article_Security_Software_Top_10_Surprises_2_43_A.htm Discussion Questions: At what price should we pay for security?
Description: Link to How Stuff Works for discussion about how to protect from phishers. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing3.htm Discussion Questions: Is the protection against phishers effective?
Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?
Description: Link to IT Security article. Hot links to articles on this slide that will extend/further explain concepts presented in the text. What are some reason why employees fail to follow internal security policies & procedures? How might they be more motivated? Use incentives. Recognition of employees/business units… Read more »
Description: In this article authors focus on 25 of the most common and easy to fix mistakes that people make when it comes to email security. The article is designed with the new internet user in mind, so if someone is an email expert, they may want to pass this along to their more novice friends… Read more »
Description: Positive security, in which it whitelists everything from entire applications down to specific functions before allowing access, sounds extreme. Unfortunately, the desktop environments we know and love prioritize ease of use over security, and we’re all feeling the pain: More than half of respondents to our 2008 InformationWeek Analytics Strategic Security poll have been hit… Read more »