SOCIAL MEDIA POLICY
Social media tools and sites have expanded the collaborative landscape and the ease with which information can be shared with large numbers of other people. Organizations, whether they use these tools or not, need to spend serious effort communicating with their employees regarding their use, and keeping confidential information private.
LATE TO THE SECURITY GATE ?
Sony announced this week that it has hired Philip Reitinger, former deputy undersecretary at the U.S.
Department of Homeland Security, as a vice president and to fill the newly created
(emphasis mine) post of Chief Security Officer.
In light of recent high profile security breaches , one cannot help but ask: “Are these people asleep at the wheel?” Often Security departments are ignored or played down in the interests of economics. Not only is security expensive, it gets in people’s way and makes then uncomfortable and/or frustrated. The end result of which is that either proper procedures don't get implemented or they fall on deaf ears.
A recent article called
by CMP Channel Group President Robert Faletra struck a resounding chord before I was more than a paragraph or two into it.
A NEW PERSPECTIVE ON PIRACY
Over the years many piracy studies have been released by industry stakeholders. Almost without exception, these have been done by entertainment and software companies, or their umbrella organizations based of course on their own figures (mostly estimates) of alleged losses. However, recently a group made up of dozens of academics have collaborated to produce the most objective and elaborate piracy study done to date. Not surprisingly, their results differ significantly from that of the copyright lobby groups that have been promulgated out over the years.
PATENT VICTORY OR BUST ?
WEB HOST TELECOMMUTE
A friend recently asked me my opinion of doing tech support for a web host through remote access (also known as telecommuting). It can be a good job so long as it is done in a proper manner and with a few things in mind.
As Christmas draws closer and the shopping frenzy gets started, the e-mail in-boxes of the world get inundated with a fresh deluge of SPAM. Fortunately. most of it gets filtered out but there is always the rare one that slips through. For those doing e-mail marketing following a few simple guidelines would likely prove more profitable in the long run — and legal too.
AUP GONE WILD
The following is an excerpt from one of the most “anal” AUP
statements I have ever read. The provisions virtually make the content unusable, and place any user instantly in violation.
MONOPOLIES ARE EVERYWHERE
When we here the word monopoly what inevitably comes to mind are huge, looming corporations controlling major markets we rely on every day. Well there can be smaller monopolies too. These are what I like to call "effective monopolies" rather than the more narrow legal definition. And these can be found everywhere.
WEB HOST OPERATING SYSTEMS
I read a comment not too long ago in a piece about Microsoft and the Web that claimed Windows had a majority of the server market. Well, that is true - sorta, kinda, if you read the statistics in a certain way.
ECO-PATENT COMMONS INITIATIVE
The World Business Council for Sustainable Development, in partnership with IBM, Nokia, Pitney Bowes and Sony, have initiated an effort to have companies release patents to the public domain aimed at increasing innovations in environmental research and development.
STRAINED CLIENT RELATIONSHIPS
After a conversation with a friend about their loss of a client I thought it would make a good article. After all, retention of current customers is as important if not moreso than the acquisition of new clients.
ARE SECURITY BEST PRACTICES A MYTH ?
An often used term in business is “best practices”. Generally, this means a commonly accepted, informally standardized set of procedures and policies aimed at a particular goal. But can one really say that the concept can be applied to security?
BLAME CANADA EH ?
One again the unbalanced right in the United States are indulging in a favorite pastime — making Canada out to be a semi-communist Third World home of yokels who don’t properly appreciate what the the great government of the United States has done for them.
FORENSICS INVESTIGATION GUIDELINES
When an incident occurs requiring a computer forensic investigation it must be done in the most responsible manner possible. While it is a given that it be done in a legal and ethical manner, it must also be done in an effective manner. The following are some basics guidelines to follow to help ensure that any investigation provides the needed information.
QUICK AND EASY SECURITY CHECKS
The Internet can be a wonderful place to find information about many things. The one thing you don't want though is for it to be a place to find out about things you regard as confidential. Here are a few quick and easy ways to check for possible security leaks without ever leaving your chair.
SCO UNABLE TO FIND PROMINENT JOURNALIST
It would appear from a recent
is unable to find the author and principal contributor of the
GHOSTS IN THE MACHINES
An ever increasing problem for those enterprises looking for better LAN
security are the numerous “ghosts” that are wandering about their networks.
COST OF MODERN PRINTING
When it comes to making hard copies of the plethora of documents used on computers daily, the true cost of printing cannot be found in the price of the printer but in the consumables and other hidden costs.
RETAIN OR DELETE
Which electronics records should you save; which are you required to save; and which should you delete? The retention of data or it's permanent deletion are flip sides of a coin that all companies must increasingly deal with. Beyond legal and ethical considerations, it is also a critical storage and security issue for any IT
While it may be startling to some it comes as no surprise to those working in the IT
security field that the executives most influential in security decision making are not those who are most supportive of security spending. This tends to have the perhaps inevitible effect of insufficient funding for IT
securiity to be as effective as it could be.
INTEL, AMD AND THE CONSUMER
While competition is invariably good for advancement of technology, and is generally good for the consumer - it can often lead to questions about how much better it might have served the consumer.
It would be nice to be able to predict who will be successful, who clients will seek out and invest with and recommend to friends, who will still be around when the others have gone. Unfortuantely clairvoyance is a chancey thing. The following characteristics tend to be common amongst successful people and their businesses.
CHOOSING AN ISP FOR BUSINESS
When it comes to choosing an ISP
for corporate intranet, extranet or internet access, knowledge of the candidates is essential. The following is a list of considerations that may be used as a checklist when shopping for a corporate ISP