Access Denied
Computer Crime: Deter, Detect, Defend

Protecting computer-accessible information has never been more critical or
more difficult to ensure.

Computer crime is a primary concern of business and government leaders
today. Traditional security measures alone are no longer sufficient to
deter, detect and defend against computer crimes committed by an
"outsider"--a hacker, a spy, a thief, a competitor, a computer terrorist,
or by someone on the inside--a current or former employee, a consultant,
supplier, vendor, or even a relative of an employee.

An effective defense against computer crime hinges upon organization-wide
awareness and across-the-board compliance with established, clearly
articulated security policies.

A brand new video from Commonwealth Films can help deter, detect, and
defend against computer crime.

Access Denied
Computer Crime: Deter, Detect, Defend
Organization-wide Awareness-training

Using a series of realistic, dramatized vignettes to illustrate crucial
points for the defense of PC, LAN, and central computer systems, Access
Denied covers the many forms of computer crime:

* industrial espionage
* destruction or alteration of data
* fraud
* invasion of privacy
* computer viruses
* theft of computer or telephone services
* theft of inventory, hardware
* unauthorized access
* software theft
* embezzlement, misappropriation of funds
* sabotage
* and more.

Designed for organization-wide awareness training, Access Denied
illustrates important do's and don'ts to help minimize or eliminate the
risk of becoming a computer crime statistic.

The video stresses the important signs that all employees need to be alert
to: unusual employee work patterns or log-on times; the appearance of
unexplained user accounts or repeated attempts to access files, PEX, or
E-Mail; a sudden jump in long distance telephone charges; telephone
requests for computer access information; unexplained activities on system
logs; and more.

Access Denied drives home the point that common-sense caution, a heightened
level of awareness, and diligent adherence to your organization's
information/computer and physical security policies are vital in the
increasingly sophisticated war against computer crime. This video serves
as an essential and integral component of any comprehensive security
initiative, addressing a specific and critically important aspect of
today's corporate/government environment. 

(120 mins.) $525.00

Other Video Titles From Our Award-winning Information/Computer Security
Video Library:

* Virus: Prevention, Detection, Cure New!
* Computers, Viruses, and Your Business New!
* Back in Business: Disaster Recovery New!
* We Lost Control: Software Piracy New!
* Mum's the Word: PC/LAN Security
* Locking the Door: Computer Security
* Invasion of the Data Snatchers
* Under Wraps: Information Security
* Buried Alive: Records Management
* Write Now/Pay Later: Document Writing
* Data Security: Be Aware or Beware
* And more.

All Commonwealth videos are available for purchase, preview evaluation, and
rental.

Preview 1-3 full-length videos together for purchase consideration for just
$45.00 (Applicable toward purchase).
For fastest service, use the fax order form on back, or call us directly.

Commonwealth Films Inc.
223 Commonwealth Ave, Boston, MA 02116
617-262-5634,  fax 617-262-6948

 ============================================================
 From the  'New Product Information'  Electronic News Service
 ============================================================
 This information was processed from data provided by the
 above mentioned company. For additional details, contact 
 the company at the address or telephone number indicated.
 OmniPage Pro is now used for converting all printed input! 
 ============================================================
 All submissions for this service should be addressed to:
 BAKER ENTERPRISES,  20 Ferro Dr,  Sewell, NJ  08080  U.S.A.
 Email: RBakerPC (AOL/Delphi), rbakerpc@delphi.com (Internet)
 ============================================================
