IT SECURITY STRATEGIES FOR SME’s

SME Managers often equate have firewall and updating antivirus software as having security. Strategy policies and business continuity plans are more or less invisible in these organisations. Many SME’s do not consider themselves possible targets for hackers and often neglect the threats of corporate espionage and therefore deem IT security as low priority. To improve…

Smart, Simple and Secure Management Options for SME’s

Information security within SME’s is a big problem for many reasons including limited resources and managers not devoting enough time and attention to security concerns. SME’s traditionally use solutions from multiple vendors which can have major gaps leaving them vulnerable to attacks. Security consultants and vendors advice that a simple solution single provider be used.…

The Hybrid Approach to System Security for SME’s

Data encryption is an important element of organisations response to security threats, a paper titled “A Hybrid Approach to System Security for SME’s: combining different cryptography techniques” and written by Georgiana Mateescu and Marius Vladescu of the Polytechnic University of Bucharest, Romania, proposes a Hybrid approach(using three levels of cryptography) for information security for SME’s.…

Integrated Information Systems In The Charity Sector; Access Group White Paper

Charities usually have separate accounting systems and CRM(Customer Relationship Management) Systems. Due to the nature of their transactions, modelling data in both systems cause problems when integrating these systems proves to be a major challenge. Developers need to do proper analysis describing their data requirements. Charities can solve this problem by using larger information packages…

The ISTC for Social Computing

The goal of the new Intel Science and Technology Center for Social Computing is bring/establish the engagement of social science and technology practice. Social Computing is the study of information technology(including digital media) as a cultural and social phenomenon i.e using social and cultural norms to understand computing. Technology affects and shapes our lives in…