Government // Cybersecurity
Commentary
4/16/2014
09:30 AM
James Bindseil
James Bindseil
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Federal IT Security Policies Must Be User Friendly

Federal agencies should choose security tools and policies that suit the productivity needs of their employees.

(Image: Community Commons Christopher Bowns)
(Image: Community Commons Christopher Bowns)

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
BobH088
50%
50%
BobH088,
User Rank: Apprentice
4/17/2014 | 11:24:59 AM
security solution
One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags (mystufflostandfound.com) let someone who finds your lost stuff contact you directly without exposing your private information. I use them on almost everything I take when I travel like my phone, passport and luggage after one of the tags was responsible for getting my lost laptop returned to me in Rome one time.
JaCa
50%
50%
JaCa,
User Rank: Strategist
4/16/2014 | 12:23:10 PM
Two common Web application attacks illustrate security concerns
Interesting article, Hackers frequently gain access to important data using flaws in IT security systems and injecting malwares into web applications. Organization should conduct regular security maintenance and testing that focuses first on the most common threats to its applications. I work for McGladrey and there is a whitepaper "Two common Web application attacks illustrate security concerns" it offers good information to readers. @ "Two common Web application attacks illustrate security concerns"   http://bit.ly/1c0f35M

 
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.