• Grid View
  • List View
  • IT Best Practices - Size Matters When It Comes to IT Security

    Size Matters When It Comes to IT Security

    IT security remains a major concern, from the largest enterprise to the home office user. The recently conducted Computer Economics IT Security Study looked into a variety of issues related to IT security budgets, incidents, and management practices. This report provides a new analysis of these metrics by applying cross comparison of organizational size with IT security problems. This analysis yields useful insights that IT managers may use to more effectively manage security spending.

    March, 2005

  • Technology Trends - Crypto Keys Lock in Security

    Crypto Keys Lock in Security

    Crypto key management is an essential component of an effective security system. Computer Economics Information Systems Spending and Technology Trends study investigated the effectiveness and cost issues associated with IT security. The findings show need for improvement both in performance and cost reduction in all aspects, including key management. Sound policies and procedures can ensure that key management protects without disrupting work processes. Click here to purchase. - $125

    October, 2004

  • IT Best Practices - 2004 IT Security Study

    2004 IT Security Study

    The newest study on IT security from Computer Economics helps senior IT and business managers develop a thorough understanding of IT security best practices, trends, and budget requirements. This study, based on a survey of 120 companies across multiple industries, is designed to help senior IT and business managers develop a thorough understanding of IT security best practices, trends, and budget requirements. This 100-page study includes over 70 graphs and tables that provide hard data that can help you justify your IT security budget and spending levels, compare your IT security management practices against industry standards, and understand the impact of IT security incidents across all industries.

    September, 2004

  • IT Best Practices - Start 2004 with a Sound Foundation for Enterprise Security

    Start 2004 with a Sound Foundation for Enterprise Security

    The new year means that IT managers will be applying new budgets toward solving all of the problems inherent in operating their systems. Although security spending represents a relatively small portion of the budget, careful application of those funds is essential in protecting both information and infrastructure. Computer Economics forecasts that about half of all organizations will be hit by at least one security attack during this year.

    February, 2004

  • IT Best Practices - Build Credibility and Trust Into Your Website

    Build Credibility and Trust Into Your Website

    The factors that encourage customers to interact frequently with a website revolve around the issues of credibility and trust. Marketers and customers are in conflict regarding the use of information. Online marketers would like to gather detailed information about their customers to be able to group them for targeted marketing and personalized offerings. Customers do appreciate personalization when it suits their needs.

    August, 2003

  • Technology Trends - Economic Realities of Wireless LANs (2Q03)

    Economic Realities of Wireless LANs (2Q03)

    Planning for the inevitable introduction of WLANs into your organization, if they are not already there, is much better than allowing a hodgepodge to develop. The two major concerns for managers in regard to WLANs are data capacity and security. Consideration of WLANs today should be limited to those defined by the 802.11 family of specifications.

    May, 2003

  • Research Bytes - Spending on IT Security Services and Products Continues to Increase

    Spending on IT Security Services and Products Continues to Increase

    A recent Computer Economics’ survey of approximately 30 midsize to large organizations indicates that, in spite of tight budgets, IT security spending is rising at a brisk pace. Over one-fifth of the companies surveyed indicated that IT security spending (in terms of actual dollars) had increased over 50% since 9/11.

    March, 2003

  • IT Best Practices - Proof of Concept Evaluates Secure Internet Customer Services (1Q03)

    Proof of Concept Evaluates Secure Internet Customer Services (1Q03)

    The Social Security Administration recently completed proof of concept testing of a number of technologies aimed at reducing its workload and enhancing efficiency of handling customer transactions.  The project was successful in showing that existing technologies could ensure secure access, protect data, and shield the privacy of CRM information.  The interoperability of applications run on hardware from multiple vendors and several software applications was an important result of this proof of concept. 

    February, 2003

  • IT Best Practices - Aberdeen: New Poster Child for Sloppy Research? (1Q03)

    Aberdeen: New Poster Child for Sloppy Research? (1Q03)

    A recent study, which shows Linux and other open source software suppliers have more security problems than Microsoft, has serious flaws.

    January, 2003

  • Technology Trends - Web Services Remain Hampered by Security Shortfalls (December 2002)

    Web Services Remain Hampered by Security Shortfalls (December 2002)

    As Web services security continues to mature, applying this technology to key enterprise applications will provide a higher ROI.

    December, 2002

  • Research Bytes - Nearly One-Third of Polled Firms Have No Written IT Security Policy

    Nearly One-Third of Polled Firms Have No Written IT Security Policy

    A survey conducted in June 2002 by Computer Economics revealed that 30% of the organizations polled do not have written IT security policies in place, despite the fact that written policies are key to a successful security effort.

    October, 2002

  • Research Bytes - IT Contract and Consulting Providers Receive Mediocre Report Cards

    IT Contract and Consulting Providers Receive Mediocre Report Cards

    A newly released study conducted by Computer Economics indicates that most end user organizations do not feel their contract and consulting service providers are delivering as high a quality of service as they would like.

    October, 2002

  • Research Bytes - Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001

    Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001

    Malicious code attacks continued to have significant economic impact during 2001. The following figures show the Computer Economics analysis of the worldwide economic impact of malicious code attacks. Data is provided by year and for specific high profile incidents.

    September, 2002

  • IT Best Practices - Internet Service Providers: Are User Identities Still Sacred? (May 2001)

    Internet Service Providers: Are User Identities Still Sacred? (May 2001)

    Are user identities are still sacred? One federal court judge in Seattle believes so. In what free speech proponents are hailing as a major First Amendment victory, a federal court in Seattle recently held that an Internet Service Provider could not be compelled to disclose the identities of certain of its users.

    September, 2002

  • IT Best Practices - Online Security: Private Sector Lags Behind Public (Jun 2001)

    Online Security: Private Sector Lags Behind Public (Jun 2001)

    Everyone has seen the weekly headlines about Internet security breaches, attacks on websites, and information pilfering. Many companies discount the risk of such activities, assuming either that they are adequately protected, or that the attackers themselves simply lack any reason to target them. Neither assumption is a safe one, and the federal government may be ahead of the private sector in figuring this out.

    September, 2002