When IT managers are being asked to cut costs in the downturn, sometimes data security takes a back seat – but now must not be a time to lose focus on this vital area. In a recession, electronic fraud and organised crime increase, the threat from disgruntled ex-employees becomes more acute, and even the most diligent of staff can make mistakes under pressure.
A comprehensive data security strategy looks at more than just traditional solutions such as anti-virus and firewalls; it encompasses in-depth control over identity and access management, encryption, internal audit, information sharing with customers and partners, and management of the wider IT infrastructure. There are so many factors to consider that reducing complexity and risk is equally vital. But how do you make sure every aspect is covered?
A recent Computing web seminar, in association with Oracle, explored how organisations are getting to grips with data security. Our panel discussed the benefits from tackling security at the data level and examined the benefits of different approaches.
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)