The use of wireless networks is increasing. The drive for a more mobile workforce, the increased use of portable devices and easier implementation are pushing companies into considering such deployments. There are many infrastructural issues that need to be dealt with, such as cost, scalability and performance. This paper, however, deals solely with the security issues related to deploying a corporate wireless network.
In preparation for the Forum's Cloud Conference in March 2010 attendees were surveyed as to their maturity in this area, the results of this survey have been combined with a number of other Forum resources, to produce this interesting insight into the corporate IT world's view of cloud computing.
The Forum has compiled this report for the benefit of its members, following the Forum’s involvement in the recent Association of Chief Police Officers (ACPO) eCrime Conference, which took place on 8-9 February 2012 in Manchester.
Over the last couple of years the Forum has regularly discussed sustainable IT and various green strategies and issues that have an impact on members. This bulletin brings together a number of resources and distills them into one, easy to read document which lays out current corporate IT thinking on sustainability.
This is a IT Security Fact sheet identifying items which affect every IT user, from User responsibilities to how to protect their data.
The popularity and wide spread use of personal digital assistants (PDA) by all segments of the business and personal community has created a double-edged sword. Many companies have few if any security tools, tips or best practices for governing the use of PDAs.
This brief is intended as a starting point for securing what may be a weak link in your organisation's security chain.
This survey was conducted prior to the Information Security Service's PCI DSS: Conference for Merchants that took place on 10th June 2009 in London. The aim of this survey was to investigate the current compliance status of large corporate and public sector organisations in relation to the Payment Card Industry's Data Security Standard (PCI DSS).
This is an example of a IT Security Screen Saver.
An almost constant series of security-related incidents is affecting millions of computer systems and networks throughout the world, and as a result, it is becoming increasingly important for companies to have planned and tested processes for dealing with these incidents in order to protect their day to day business.
The third part of the Employment Practices Data Protection Code was published by the Information Commissioner on 11th June 2003 as three documents; Guide, Guide for small business, Supplementary Guidance. These give practical advice on how companies can comply with the Data Protection Act 1998 when monitoring employees at work. Failure to comply with the legislation can lead to criminal action against the company.
The objective of this executive guideline is to highlight the risks and benefits of adopting a data retention policy. It will describe how the retention policies will ensure compliance with legislation and offer a return of investment through reduction in storage overheads, apply disciplined management of information processes and the potential risks of reputational harm.
Leading the way, or in the way?