Wednesday, January 30, 2013

6 Steps To Better Customer Data Protection

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, January 30, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist 6 Steps To Better Customer Data Protection
By Kevin Casey
Privacy isn't a concern just for the Googles and Facebooks of the world. Here are six ways small and midsize businesses (SMB) can better protect their customers -- and themselves.

MUST READ
FBI Busts Alleged Skype 'Sextortionist'
Man is accused of extorting over 350 women into posing nude on Skype by threatening to post compromising photos of them to Facebook.

Bank DDoS Attackers Claim Victory Regarding Film
One copy of widely viewed film that attacks the founder of Islam has been excised from YouTube. But who removed it, and will all copies be pulled?

Unplug Universal Plug And Play: Security Warning
Tens of millions of devices with UPnP are remotely exploitable, warns Metasploit creator. New tool detects vulnerable devices, which include 6,900 different product versions spanning 1,500 vendors.

HP Disputes Printer Security Vulnerabilities
Weaknesses in printer networking software could be used to bypass authentication, deny service and retrieve documents from any user, Spanish researcher says.

Google Faces Safari Privacy Claim In U.K.
Google is attempting to have similar claims dismissed in the U.S. for lack of harm.

Anonymous Plays Games With U.S. Sites
Protesting over death of Internet activist Aaron Swartz, Anonymous defaces U.S. government websites to hide a free game of Asteroids.

  Digital Issue  
DOWNLOAD INFORMATIONWEEK EDUCATION'S FIRST DIGITAL ISSUE
Inside the all-digital premiere issue of InformationWeek Education: Can data analysis keep students on track and improve college retention rates?

Also: Higher education is just as prone to tech-based disruption as other industries.


DOWNLOAD NOW FREE (Registration Required)
 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Cybersecurity on the Offense
Can you -- and should you -- strike back at attackers? It's a complex question with deep ethical, legal and practical considerations. While governments have drawn lines in the sand, for the private sector it's still early days in the offensive cyber security era. You can, however, be proactive. Here's how.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Safely Unleashing the Power of Social Media
In this whitepaper you will understand that by being proactive and working with the marketing department to enable them to securely and easily register social media users in their system, you will potentially be in a position to positively influence revenue growth.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

MS Office 2013 Upgrade: 4 Points to Consider
Microsoft Office 2013 offers some compelling new features, especially for mobile users. But how will buyers respond to the new version's license shake-up and cloud emphasis?

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Microsoft Office 2013: 10 Best Features
Go inside Office 2013, Microsoft's ambitious suite for both desktop and mobile devices.

CES 2013: 9 Cool Gadgets
Consumer Electronics Show is a tech smorgasbord. Here are nine products that attest to the show's overwhelming variety.

BlackBerry 10 Has This CIO Singing Taylor Swift
My enterprise will give the new BlackBerry 10 and BES careful consideration, but it appears our RIM romance is over.


 

WEBCASTS:

Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment