Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.

Information Management's DM RadioPrivacy remains a hot topic these days, and for all kinds of reasons. Web technologies can now track each and every movement you make in a browser, then map that all back to your IP address. The selling point is always more customized content (usually ads), but whither privacy?
Information Management NewsAll companies are aware of the growing risk of cyberattacks, yet few are taking the steps necessary to protect critical information. The key? Senior managers need to lead.
Comments (1)
Information Management NewsWarnings about the Svpeng malware that targets cellphones are proving to be unwarranted panic, skeptics say. Others argue that it is too early to ignore this powerful new strain of mobile malware that has stolen the financial data of customers elsewhere in the world.
BlogIn many security breaches, the security technology put in place did not fail. The Cloud technology did not fail. The management of security failed.
NewsP.F. Chang's China Bistro, a chain of Asian-themed restaurants, said it's investigating whether it was the target of a data breach following a report that stolen customer data had appeared online.
BlogThe old adage, "You can't manage what you don't measure," still applies--and even more so today with healthcare organizations facing a number of external and internal security challenges.
Information Management NewsNew survey on the state of cybercrime highlights deficiencies in persistence and technological skills of organizations relative to cyber adversaries
TrendsThe average consolidated total cost of a data breach rose 15 percent in the last year
A recently released Accenture survey, "Eighty Percent of Consumers Believe Total Data Privacy No Longer Exists," outlines six ways in which consumers would like companies to be transparent about how their personal information is being protected.
Information Management NewsNew survey and risk assessment show vendor risk management practices are lacking
TrendsTrustworthiness of networks, device theft and stolen identity risks top consumer concerns
ColumnAfter working closely with service companies of varying sizes over the past few years, I’ve concluded that they are fully aware of their HIPAA compliance obligations but often lack the funding, staffing or security expertise to adequately address them.
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.