Editor's Note: Let's Reclaim Our E-Mail In-Boxes - InformationWeek
IoT
IoT
Business & Finance
Commentary
8/29/2003
06:50 PM
Stephanie Stahl
Stephanie Stahl
Commentary
50%
50%

Editor's Note: Let's Reclaim Our E-Mail In-Boxes

I don't know, maybe it's because Mars is so close to the Earth right now, but things in my universe seem a bit out of whack these days. First of all, my oldest cat has decided that he'll gladly exit from any door in the house, but he'll only enter through the front door. Perhaps he's telling me I need to treat him more like a guest rather than some fuzzy thing that gets little attention anymore and is constantly being chased by giddy toddlers who think it's fun to put birthday hats on him. And then I hear about a large, reputable manufacturing company that hasn't done a vulnerability assessment since the mid-'90s but thinks its security strategy is acceptable--at a time when viruses and malicious code are getting nastier than ever. And senior editor George V. Hulme reports on our Global Security Survey and reveals that even when a threat is understood and a patch is available, security managers still face resistance from business units.

But worst of all in my wacky universe is the fact that at a time when spam is getting more attention from software and networking companies, legislators, privacy advocates, and others, it's only getting worse in my E-mail box! And get this, those "urgent and confidential business transaction" messages I get several times a week have been reduced to $15 million that will go into my bank account if I respond right away. Six months ago it was $30 million. What has this world come to? Like I'm going to give out my bank account number for a paltry $15 million?

All kidding aside, it's time to fight back. This insidious, annoying, productivity-sapping stuff has got to stop, and the people responsible for it must be held accountable. Now, if only we could slap $30 million fines on all spammers, that might get my universe balanced once again.

Stephanie Stahl
Editor
sstahl@cmp.com


To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll