Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


Information Management NewsNew survey on the state of cybercrime highlights deficiencies in persistence and technological skills of organizations relative to cyber adversaries
TrendsThe average consolidated total cost of a data breach rose 15 percent in the last year
A recently released Accenture survey, "Eighty Percent of Consumers Believe Total Data Privacy No Longer Exists," outlines six ways in which consumers would like companies to be transparent about how their personal information is being protected.
Information Management NewsNew survey and risk assessment show vendor risk management practices are lacking
TrendsTrustworthiness of networks, device theft and stolen identity risks top consumer concerns
ColumnAfter working closely with service companies of varying sizes over the past few years, I’ve concluded that they are fully aware of their HIPAA compliance obligations but often lack the funding, staffing or security expertise to adequately address them.
Information Management NewsOn Wednesday, the Federal Financial Institutions Examination Council announced plans for cybersecurity risk assessments of banks during a webinar.
BlogAs we watch and see if fitness data proves fit for the purpose of its many potential uses, we should keep a close eye on not only data accuracy, but also data privacy
TrendsGartner says securing the IoT expands the responsibility of the traditional IT security practice
CommentaryInsurers are on the front lines of the cyber risk fight and can help clients discover and leverage best practices across industries.
TrendsInvestments in content security by small businesses worldwide will see a compound annual growth rate of 7.8 percent between 2014 and 2017
TrendsResearch by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.
Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.