MILNER.ca : Business

By: Milner  09-12-2011
Keywords: Security, Remote Access, E-mail Marketing

SOCIAL MEDIA POLICY

Social media tools and sites have expanded the collaborative landscape and the ease with which information can be shared with large numbers of other people. Organizations, whether they use these tools or not, need to spend serious effort communicating with their employees regarding their use, and keeping confidential information private.



LATE TO THE SECURITY GATE ?

Sony announced this week that it has hired Philip Reitinger, former deputy undersecretary at the

U.S.

Department of Homeland Security, as a vice president and to fill the

newly created

(emphasis mine) post of Chief Security Officer.



COMMUNICATING SECURITY

In light of recent high profile security breaches , one cannot help but ask: “Are these people asleep at the wheel?” Often Security departments are ignored or played down in the interests of economics. Not only is security expensive, it gets in people’s way and makes then uncomfortable and/or frustrated. The end result of which is that either proper procedures don't get implemented or they fall on deaf ears.



CORPORATE DISCONNECT

A recent article called

by CMP Channel Group President Robert Faletra struck a resounding chord before I was more than a paragraph or two into it.



A NEW PERSPECTIVE ON PIRACY

Over the years many piracy studies have been released by industry stakeholders. Almost without exception, these have been done by entertainment and software companies, or their umbrella organizations based of course on their own figures (mostly estimates) of alleged losses. However, recently a group made up of dozens of academics have collaborated to produce the most objective and elaborate piracy study done to date. Not surprisingly, their results differ significantly from that of the copyright lobby groups that have been promulgated out over the years.



PATENT VICTORY OR BUST ?



WEB HOST TELECOMMUTE

A friend recently asked me my opinion of doing tech support for a web host through remote access (also known as telecommuting). It can be a good job so long as it is done in a proper manner and with a few things in mind.



E-MAIL MARKETING

As Christmas draws closer and the shopping frenzy gets started, the e-mail in-boxes of the world get inundated with a fresh deluge of SPAM. Fortunately. most of it gets filtered out but there is always the rare one that slips through. For those doing e-mail marketing following a few simple guidelines would likely prove more profitable in the long run — and legal too.



AUP GONE WILD

The following is an excerpt from one of the most “anal”

AUP

statements I have ever read. The provisions virtually make the content unusable, and place any user instantly in violation.



MONOPOLIES ARE EVERYWHERE

When we here the word monopoly what inevitably comes to mind are huge, looming corporations controlling major markets we rely on every day. Well there can be smaller monopolies too. These are what I like to call "effective monopolies" rather than the more narrow legal definition. And these can be found everywhere.



WEB HOST OPERATING SYSTEMS

I read a comment not too long ago in a piece about Microsoft and the Web that claimed Windows had a majority of the server market. Well, that is true - sorta, kinda, if you read the statistics in a certain way.



ECO-PATENT COMMONS INITIATIVE

The World Business Council for Sustainable Development, in partnership with IBM, Nokia, Pitney Bowes and Sony, have initiated an effort to have companies release patents to the public domain aimed at increasing innovations in environmental research and development.



STRAINED CLIENT RELATIONSHIPS

After a conversation with a friend about their loss of a client I thought it would make a good article. After all, retention of current customers is as important if not moreso than the acquisition of new clients.



ARE SECURITY BEST PRACTICES A MYTH ?

An often used term in business is “best practices”. Generally, this means a commonly accepted, informally standardized set of procedures and policies aimed at a particular goal. But can one really say that the concept can be applied to security?



BLAME CANADA EH ?

One again the unbalanced right in the United States are indulging in a favorite pastime — making Canada out to be a semi-communist Third World home of yokels who don’t properly appreciate what the the great government of the United States has done for them.



FORENSICS INVESTIGATION GUIDELINES

When an incident occurs requiring a computer forensic investigation it must be done in the most responsible manner possible. While it is a given that it be done in a legal and ethical manner, it must also be done in an effective manner. The following are some basics guidelines to follow to help ensure that any investigation provides the needed information.



QUICK AND EASY SECURITY CHECKS

The Internet can be a wonderful place to find information about many things. The one thing you don't want though is for it to be a place to find out about things you regard as confidential. Here are a few quick and easy ways to check for possible security leaks without ever leaving your chair.



SCO UNABLE TO FIND PROMINENT JOURNALIST

It would appear from a recent

at

that

SCO

is unable to find the author and principal contributor of the

web site.



GHOSTS IN THE MACHINES

An ever increasing problem for those enterprises looking for better

LAN

security are the numerous “ghosts” that are wandering about their networks.



COST OF MODERN PRINTING

When it comes to making hard copies of the plethora of documents used on computers daily, the true cost of printing cannot be found in the price of the printer but in the consumables and other hidden costs.



RETAIN OR DELETE

Which electronics records should you save; which are you required to save; and which should you delete? The retention of data or it's permanent deletion are flip sides of a coin that all companies must increasingly deal with. Beyond legal and ethical considerations, it is also a critical storage and security issue for any

IT

department.



DECISIONS, DECISIONS

While it may be startling to some it comes as no surprise to those working in the

IT

security field that the executives most influential in security decision making are not those who are most supportive of security spending. This tends to have the perhaps inevitible effect of insufficient funding for

IT

securiity to be as effective as it could be.



INTEL, AMD AND THE CONSUMER

While competition is invariably good for advancement of technology, and is generally good for the consumer - it can often lead to questions about how much better it might have served the consumer.



SUCCESSFUL CONSULTANTS

It would be nice to be able to predict who will be successful, who clients will seek out and invest with and recommend to friends, who will still be around when the others have gone. Unfortuantely clairvoyance is a chancey thing. The following characteristics tend to be common amongst successful people and their businesses.



CHOOSING AN ISP FOR BUSINESS

When it comes to choosing an

ISP

for corporate intranet, extranet or internet access, knowledge of the candidates is essential. The following is a list of considerations that may be used as a checklist when shopping for a corporate

ISP

.


Keywords: E-mail Marketing, Remote Access, Security, Social Media Policy

Contact Milner

Email - none provided

Print this page

Other products and services from Milner

09-12-2011

MILNER.ca : Internet and WWW

Organizations, whether they use these tools or not, need to spend serious effort communicating with their employees regarding their use, and keeping confidential information private. Social media tools and sites have expanded the collaborative landscape and the ease with which information can be shared with large numbers of other people.


09-12-2011

MILNER.ca : Miscellany

I was recently cleaning out some old papers from a desk and came across the following short piece about friendship and thought I would share it. Depression is a common yet treatable condition affecting about twenty-five percent of women and ten percent of men sometime in their lives. Christmas is here and some credit is due to our service men and women for our being able to celebrate these festivities.


09-12-2011

MILNER.ca : Government

They have scared people, understandably, and due to the knee jerk reaction of politicians, their desire to be seen as saviours, and the ulterior motives of those who benefit by restrictions have forever changed the way of life in previously free and easy democratic societies.


09-12-2011

MILNER.ca : News

Things got interesting at this year’s DefCon conference when an associate producer with television news magazine Dateline NBC fled Friday after being publicly identified her as an undercover reporter in front of the crowd gathered for a popular conference session.


09-12-2011

MILNER.ca : Society and Culture

Not that it will come as a surprise to anyone that has recently filled their vehicle with gasoline, but a study by independent researchers has found that Canadian consumers are paying gasoline prices far higher than can be justified by production costs or historic profit margins. I was recently cleaning out some old papers from a desk and came across the following short piece about friendship and thought I would share it.