Issue Date: September 13, 2010
Guarding The Enterprise
Information technology security has traditionally been a matter of protecting computer systems from malicious hackers. However, given the rising flow of data through corporate IT systems—often via portable devices such as smart phones and laptops and increasingly within virtual cloud computing environments—it’s clear that IT systems are subject to a wide range of vulnerabilities. Nowadays, one of the biggest threats to IT security is the well-meaning employee who inadvertently triggers a data breach by e-mailing . . .
To view the rest of this content, please log in with your ACS ID.
- Chemical & Engineering News
- ISSN 0009-2347
- Copyright © American Chemical Society