![]() |
![]() |
Advertise Contact SecurityWatch |
Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers |
VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP. ![]() |
Access Management and User Accountability for WLANs Author: Vernier Networks, Inc. Wednesday, 12 January 2005, 21:12 GMT “We have met the enemy, and he is us.” Read the latest FBI/CSI Computer Crime and Security Survey, and that adage from the old Pogo comic strip is likely to be your conclusion. The survey found that insider abuse of network access was the second most common form of network attack. Insider abuse was reported by 80% of survey respondents—second only to virus incidents (82%). And—just as astonishing—disgruntled employees (77%) were ranked just behind independent hackers (82%) as a likely source of attacks.1 As these numbers show, organizations who want to secure their networks need to do more than erect a defensive perimeter to keep out strangers. They need to find a way to prevent attacks from insiders, as well. Read the full paper in PDF here |
Tuesday, September 20, 2005 Network Security
GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available. Network Security Software - Sponsored by GFI Network Security. Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial! Wireless Security
![]() Press Releases
|
Copyright © 2000 - 2005 eBCVG IT Security | Affiliates :: RSS feeds :: Privacy |