Datamation Logo
Home
Authors
Posts by Sharon Gaudin

Sharon Gaudin

How To Get The Most Out Of Your Security Software

Security
May 15, 2002

This is a sidebar to Security Sieves: Misused Technology Leaving Networks Vulnerable. Before companies invest more of their budgets on new security technologies, they should make sure they’re properly using what they already have, say industry analysts and security consultants. “Are IT technologies being used efficiently? No. Are they optimized? No,” says Michael Rasmussen, director […]

Security Sieves: Misused Technology Leaving Networks Vulnerable

Security
May 15, 2002

Despite the big money IT executives are spending to protect their companies from security breaches, industry analysts and security consultants say most are misusing the technology they already have installed. “The problem is pretty widespread,” says Paul Robertson, director of risk assessment at Herndon, Va.-based TruSecure Corp. “We did a study that showed that about […]

Tough Computer Crime Bill Clears Hurdle

Security
May 10, 2002

A bill designed to stiffen the penalties for computer crime could help law enforcement crack down on industrial espionage and computer sabotage, according to industry watchers. “They really have to juice up the sentencing a lot,” says Assistant U.S. Attorney V. Grady O’Malley, who prosecuted the first federal criminal case of computer sabotage. “We need […]

The Feds’ Top Hacker Speaks

Security
May 10, 2002

One man is known for attacking the computer networks at various government agencies in the United States. His photo, along with a warning to not give him admittance to the building, is posted all around the Beltway. He may not necessarily be the most popular guy in town but 24 government agencies, like the IRS […]

Social Engineering: The Human Side Of Hacking

Security
May 10, 2002

A woman calls a company help desk and says she’s forgotten her password. In a panic, she adds that if she misses the deadline on a big advertising project her boss might even fire her. The help desk worker feels sorry for her and quickly resets the password — unwittingly giving a hacker clear entrance […]

How To Thwart The ‘Social Engineers’

Security
May 10, 2002

Editor’s Note: This is a sidebar to Social Engineering: The Human Side of Hacking. Hackers looking to disrupt business or steal corporate information are using social engineering techniques to break into computer networks. Security experts from both government and private businesses offer some suggestions to protect your company from these attacks: Shred any phone lists, […]

Employee Abuse of Internet Rampant

Security
April 24, 2002

Before cracking down on Internet access abuse at her family’s 60-year-old auto dealership, the IT director there found a few employees were spending as much as six out of their eight-hour work day on the Internet — playing games, gambling, buying stock and even downloading porn. “They obviously weren’t doing their job,” says Shawn Vidmar, […]

Steps To Control Worker Misuse of ‘Net

Security
April 24, 2002

(Editor’s Note: This is a sidebar to Employee Abuse of Internet Rampant.) Most companies take very few, if any, steps to control or guide their employees’ Internet access, according to industry analysts. Here are a few recommendations from corporate users, analysts and security consultants on how to take charge of the situation: The first thing […]

Page 42 of 42
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.