- Grid View
- List View
Size Matters When It Comes to IT Security
IT security remains a major concern, from the largest enterprise to the home office user. The recently conducted Computer Economics IT Security Study looked into a variety of issues related to IT security budgets, incidents, and management practices. This report provides a new analysis of these metrics by applying cross comparison of organizational size with IT security problems. This analysis yields useful insights that IT managers may use to more effectively manage security spending.
Crypto Keys Lock in Security
Crypto key management is an essential component of an effective security system. Computer Economics Information Systems Spending and Technology Trends study investigated the effectiveness and cost issues associated with IT security. The findings show need for improvement both in performance and cost reduction in all aspects, including key management. Sound policies and procedures can ensure that key management protects without disrupting work processes. Click here to purchase. - $125
2004 IT Security Study
The newest study on IT security from Computer Economics helps senior IT and business managers develop a thorough understanding of IT security best practices, trends, and budget requirements. This study, based on a survey of 120 companies across multiple industries, is designed to help senior IT and business managers develop a thorough understanding of IT security best practices, trends, and budget requirements. This 100-page study includes over 70 graphs and tables that provide hard data that can help you justify your IT security budget and spending levels, compare your IT security management practices against industry standards, and understand the impact of IT security incidents across all industries.
Start 2004 with a Sound Foundation for Enterprise Security
The new year means that IT managers will be applying new budgets toward solving all of the problems inherent in operating their systems. Although security spending represents a relatively small portion of the budget, careful application of those funds is essential in protecting both information and infrastructure. Computer Economics forecasts that about half of all organizations will be hit by at least one security attack during this year.
Build Credibility and Trust Into Your Website
The factors that encourage customers to interact frequently with a website revolve around the issues of credibility and trust. Marketers and customers are in conflict regarding the use of information. Online marketers would like to gather detailed information about their customers to be able to group them for targeted marketing and personalized offerings. Customers do appreciate personalization when it suits their needs.
Economic Realities of Wireless LANs (2Q03)
Planning for the inevitable introduction of WLANs into your organization, if they are not already there, is much better than allowing a hodgepodge to develop. The two major concerns for managers in regard to WLANs are data capacity and security. Consideration of WLANs today should be limited to those defined by the 802.11 family of specifications.
Spending on IT Security Services and Products Continues to Increase
A recent Computer Economicsâ survey of approximately 30 midsize to large organizations indicates that, in spite of tight budgets, IT security spending is rising at a brisk pace. Over one-fifth of the companies surveyed indicated that IT security spending (in terms of actual dollars) had increased over 50% since 9/11.
Aberdeen: New Poster Child for Sloppy Research? (1Q03)
A recent study, which shows Linux and other open source software suppliers have more security problems than Microsoft, has serious flaws.
Nearly One-Third of Polled Firms Have No Written IT Security Policy
A survey conducted in June 2002 by Computer Economics revealed that 30% of the organizations polled do not have written IT security policies in place, despite the fact that written policies are key to a successful security effort.
IT Contract and Consulting Providers Receive Mediocre Report Cards
A newly released study conducted by Computer Economics indicates that most end user organizations do not feel their contract and consulting service providers are delivering as high a quality of service as they would like.
Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001
Malicious code attacks continued to have significant economic impact during 2001. The following figures show the Computer Economics analysis of the worldwide economic impact of malicious code attacks. Data is provided by year and for specific high profile incidents.
Internet Service Providers: Are User Identities Still Sacred? (May 2001)
Are user identities are still sacred? One federal court judge in Seattle believes so. In what free speech proponents are hailing as a major First Amendment victory, a federal court in Seattle recently held that an Internet Service Provider could not be compelled to disclose the identities of certain of its users.
Online Security: Private Sector Lags Behind Public (Jun 2001)
Everyone has seen the weekly headlines about Internet security breaches, attacks on websites, and information pilfering. Many companies discount the risk of such activities, assuming either that they are adequately protected, or that the attackers themselves simply lack any reason to target them. Neither assumption is a safe one, and the federal government may be ahead of the private sector in figuring this out.