Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even though many organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.
You can substitute any threat or compliance challenge, for any industry, and come to the same conclusion. With the advent of IP-based security and the widespread use of non-proprietary servers and storage, solving problems through security is no longer simply the domain of the Security group. Because IT has subject matter expertise, and often holds the budget reins, IT now has a head seat at the table.
From newspapers and television broadcasts to cell phones, computers and radios, our daily routine is surrounded and bombarded with all forms of communications, and we may feel informed.
There are three significant issues facing the online security industry in 2011. None of them are particularly new, but they are approaching crisis point.
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Some policies, procedures and measures can be counterproductive when it comes to protecting emails, voicemails and communicating of large data files, contends Steven Brower of the law firm Buchalter Nemer.