Thursday, 15 March 2012

Test Your Password Acumen

Finding us in your spam mailbox? Please add us to your address book!
IT Business Edge Logo Trouble viewing this email? View in Browser  Manage my subscriptions
Fortifying Network Security March 14, 2012
Passwords are often sought after by hackers because they are the gateway to data, systems and networks. Security breaches by hacktivist groups like LulzSec and Anonymous often result in the release of passwords, which then provides the opportunity to snag other sensitive data like credit card information. Therefore, a strong knowledge of password management is important in keeping information secure. These 10 questions will test your password acumen. Read more >
FREE Securing Smartphones & Tablets for Dummies Book from Sophos
Learn how to build a mobile security strategy and prevent data loss. Get your book today. >

Blogs
Sue Marquette Poremba
Data Security

Carl Weinschenk
Data and Telecom
Susan Hall
Charting Your IT Career

The True Value of Business Analytics The True Value of Business Analytics
 
Discover the key role line-of-business users have in developing and evaluating business analytics tools.
Download now >



Regardless of whether companies have official BYOD policies, mobile device proliferation signifies the potential for a dramatic rise in campus LAN traffic in the years to come.

Servers hold some of your enterprise's most valuable information: R&D, personally identifiable information and corporate financial data. This guide covers the most important issues in locking down your servers.

For an organization-wide security program to be effective, first it must be carefully engineered. This job description will help you evaluate candidates for the vital position of Senior Security Engineer.
Featured White Papers

Matching a VPN to Your WAN: Choosing the Best Type for Your OrganizationRead this white paper to examine the various types of wide-are networks (WANs) and why IT departments gravitate towards specific WAN solutions.
•  Mobile Security Policy and Practices
for Safer Corporate Data
•  How to Reduce Hardware Costs
by a Factor of 5X
•  Fast to Virtualize, Slow to Secure:
Balancing Protection & Performance

IBM


Excerpt from
Sue Marquette Poremba
Data Security

Latest White Papers
This e-mail is sent by: IT Business Edge, property of QuinStreet, Inc. Attn: Newsletter Subscription Dept. 950 Tower Lane, 6th Floor Foster City, CA 94404

Copyright © 2012 QuinStreet, Inc. All rights reserved.

E-mail Reports
Sign up for these additional e-mail reports to get the best return on your company's technology and talent:
•  Aligning IT & Business Goals   
•  Optimizing Infrastructure   
•  Integrating the Enterprise   
•  Maximizing IT Investments   
•  Business Tools & Templates
•  IT Careers
•  Leveraging Enterprise Software
•  Managing Compliance Standards
•  Mobile and Telecom
•  Fortifying Network Security
•  Daily Edge


 

0 comments:

Post a Comment