Information Security

Group founded 04 Apr 2007
Posts 205
Members 40
Group summary

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

More blogs
See all Blogs »
Retired Member

'PROTECT OUR DATA OR BE FINED' STATES THE UK CONSUMER!

Despite Information Commissioner doling out his first-ever fines for Data Protection Act breaches, the UK consumer wants tougher penalties for those deemed to be wrong-doers. Isn’t it great when you ...

06 Dec 2010
Retired Member

RANCOUR AND 10M EURO BILL FOLLOWS UBS EMAIL ERROR

Ever clicked send on an email, and instantly regretted it? I think we’ve all been there – but perhaps not to the scale of one UBS employee this week, where a small error has created some rather signif...

23 Nov 2010
Retired Member

UK Businesses are Falling Victim to the Same Old Scams

Following recent news that more than two-thirds of companies have been hit by data breaches over the past year, the report featured in Computer Weekly is an interesting, if not alarming, confirmation...

23 Nov 2010
Retired Member

Why don't we check our credit reports?

We all know about identity fraud and the various ways this can happen, but what about the tools to fight identity fraud? Well, there are industry measures in place to stop people’s identities being us...

22 Nov 2010
Retired Member

Apple: the 800 pound gorilla of mobile payments

To date, the poor availability of phones with NFC technology has been one of the factors holding back the use of this technology to enable wave-and-pay mobile payments in a shop or peer-to-peer paymen...

03 Nov 2010
Retired Member

Working from home, is your office data security compromised?

Key security considerations for home and mobile workers In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect empl...

01 Nov 2010
Retired Member

Are wireless networks the next threat to our identity?

There is no doubt we live in an increasingly mobile, fast-paced and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen then bin ra...

29 Oct 2010
Retired Member

Cairo conference focuses on Data Field Encryption

If Visa’s Payment Security Forum held in Cairo this week is anything to go by, Data Field Encryption projects certainly seem to be on the agenda for banks in the Middle East, Africa, and Eastern Euro...

30 Sep 2010
Lachlan Gunn

Now you can see why you should protect your PIN at an ATM!

I first did a blog on Do you Protect Your PIN at ATM on this site last winter. In it I stated: "The most common ways that criminals obtain a PIN at an ATM are by looking over your shoulder (defe...

23 Sep 2010
Retired Member

Canada shows how EMV migration can impact fraud

The voices calling for the U.S. to migrate to EMV have been growing louder over the past few months with Walmart, T-Mobile and even the Federal Reserve calling for or discussing the move. Meanwhile, ...

09 Sep 2010

Now hiring