Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


Information Management NewsAs cyberattacks against banks escalate — with 93 percent of banks worldwide reporting they've been hit — Bremer Bank in Minnesota ramps up its defenses.
Information Management NewsHome Depot is working with banks and law enforcement agencies to investigate a potential theft of its customers' credit and debit card information.
Information Management NewsAlthough bankers are (hopefully) less likely to store compromising selfies in the cloud, the infiltration of celebrities' iCloud accounts illustrates the danger of saving anything with a consumer-oriented cloud service.
Information Management NewsBoards at community banks are being asked to have greater oversight of cybersecurity issues as data breaches continue to mount. The challenge is balancing such work with other demands.
Comments (1)
Information Management NewsGartner forecasts increased growth in security spending, including capabilities delivered by a range of software and services
Comments (2)
Information Management NewsJPMorgan customers were targeted with a phishing scam earlier this week aimed at obtaining online banking credentials.
Information Management NewsResearch firm ABI estimates data loss prevention market to reach $1.7 billion by year end
Comments (2)
CommentaryDeloitte research finds that financial services is the industry most targeted by cyber criminals.
Comments (1)
Information Management NewsA gang of hackers in Russia has amassed 1.2 billion sets of looted user names and passwords, according to a U.S. security company that said it's the largest known cache of stolen personal information.
Comments (1)
Information Management NewsThey haven't caught much media attention lately, but distributed denial of service attacks continue to take place and have become larger, researchers analyzing the latest attack patterns say.
Comments (1)
Information Management's DM RadioEstimates for the potential percentage of online accounts that are fake range from the low teens to upper 20s. Emails, Facebook pages, Twitter handles, and even more serious types of business accounts are plagued by fraud these days. What can you do to protect against Internet forgeries? Register for this episode of DM Radio to find out!
Information Management NewsThird parties manage 70 percent of private systems, and that figure is on the rise, according to a report from Technology Business Research.
Comments (1)
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.