• Grid View
  • List View
  • IT Best Practices - Computer Economics Joins the National Cyber Security Alliance (Apr 2002)

    Computer Economics Joins the National Cyber Security Alliance (Apr 2002)

    The National Cyber Security Alliance, a unique partnership between the federal government and leading private sector companies, continues to gain momentum. The Alliance’s Stay Safe Online Campaign website, www.staysafeonline.info, has received over 2 million hits since its launch in February 2002.

    May, 2002

  • IT Best Practices - Security Management Update

    Security Management Update

    The importance of managing information systems as well as corporate security has been highlighted by the terrorist attacks of 2001. Computer Economics has been consistently reporting on significant research on security management and the perspectives of managers, security professionals, and consumers on security issues. The following studies and events have occurred over the last few months.

    April, 2002

  • IT Best Practices - Security Awareness Is Low (April 2002)

    Security Awareness Is Low (April 2002)

    PentaSafe Security Technologies has published its 2002 Security Awareness Index (SAI) Report based on results from a free online survey, designed to measure organizations’ information security awareness. Analyzing responses from 583 companies and 1,350 individual employees worldwide, the 2002 SAI Report indicates that 23% of security officers consider their organization’s security awareness as dangerously inadequate, while an additional 44% consider their security awareness inadequate. Nearly 6 out of 10 employees who have taken the survey score, on average, only a D or unsatisfactory grade when it comes to appropriate security awareness and behavior.

    April, 2002

  • IT Best Practices - The Computer Economics Security Review 2002 (April 2002)

    The Computer Economics Security Review 2002 (April 2002)

    The focus on security has been heightened by the September 11 terrorists attacks on the United States. The attention to improving security has been long overdue and it is tragic that it took such events to raise the awareness about the need for security.

    April, 2002

  • IT Best Practices - Global Tensions Heighten IT Security Awareness (March 2002)

    Global Tensions Heighten IT Security Awareness (March 2002)

    The war on terrorism has increased anxiety throughout the U.S. Not the least concerned are managers and users of IT systems. Numerous statistics show that this concern is well placed, but the source of attacks on IT systems is more likely to be domestic than foreign. Company employees, not hackers on the Internet, have caused the largest financial losses from security breaches. This fact should not be interpreted as recommending minimizing protecting against exterior security invasions but rather that good security must consider all potential points of attack.

    March, 2002

  • Technology Trends - Planning for Wireless Data Communications

    Planning for Wireless Data Communications

    As wireless data communications becomes a reality in today's ever-shrinking world of business and commerce, enterprises should evaluate the technology and begin formulating a plan for adoption. Wireless data solutions are a vital facet of remote access technology for companies with an increasing number of mobile or remote employees. Enterprises have the opportunity to deliver high-speed voice, video, and data traffic to employees carrying personal communications services (PCS) systems at their side.

    March, 2002

  • IT Best Practices - Financial Impact and Background Information on Distributed Denial of Service Attacks

    Financial Impact and Background Information on Distributed Denial of Service Attacks

    In early February 2000, seven top e-commerce websites in the private sector were attacked by distributed denial of service (DDoS) intrusions, resulting in a $10.6 million loss in unrealized revenues from sales and advertising. From our analysis of Securities and Exchange Commission (SEC) filings and Media Metrix data, we estimate that in a reporting quarter, there are 75 high-volume days. We estimate that DDoS attacks cost the e-commerce sites 24 hours worth of high-volume revenues.

    March, 2002

  • IT Best Practices - How to Report Internet and Computer-Related Crimes (Jul 2000)

    How to Report Internet and Computer-Related Crimes (Jul 2000)

    Internet and computer-related crimes should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international level.

    March, 2002

  • IT Best Practices - Biometric Security Moves Into the Real World

    Biometric Security Moves Into the Real World

    No system administrator wants to admit the vulnerability of IT systems protected merely by passwords. The need to protect valuable, proprietary information systems against unauthorized access is encouraging a number of organizations to introduce biometric security measures. This short report outlines six types of biometric security systems. (3 pp, 2 figs.)

    March, 2002

  • IT Best Practices - Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Workplace violence is considered the most significant security threat to American business, according to a seventh annual Pinkerton survey completed by 286 corporate security professionals. The second most important security concern identified by the survey is the potential threat to Internet sites and computer networks. This concern jumped to second place this year from seventh last year. The study "Top Security Threats and Security Issues Facing Corporate America" was completed in May 2000 and identified the following top 10 security threats.

    March, 2002

  • IT Best Practices - Build a Security Conscious Organization

    Build a Security Conscious Organization

    Based on Computer Economics projections, computer crime will grow by an estimated 230 percent during 2001. Similar trends are expected with Internet fraud. All IT managers would agree that securing their IT resources is a necessity, but many are not willing to commit to the continual effort required.

    February, 2002

  • IT Best Practices - E-Commerce Site Security Pays Off (Oct 2000)

    E-Commerce Site Security Pays Off (Oct 2000)

    Virus attacks, credit card fraud, website content modifications, proprietary information theft, and denial of service are all reasons to recognize that protecting e-commerce is essential. Failure to do so will cost your company in dollars and cents. Not only is your organization susceptible to lawsuits from customers and business partners, but also many users are uncomfortable using e-commerce for purchasing because of these threats.

    October, 2000