Letters To The Editor - InformationWeek
IoT
IoT
News
Commentary
12/11/2002
12:16 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

Letters To The Editor

It's Not Safe Out There
I was amused at the stories on p. 24 of the Dec. 2 issue on the benefits of safe and secure E-mails and how to keep your identity safe.

No program is completely safe, regardless of what it does, where it is, or how well encrypted it is ("Bank Delivers Safe And Secure Messages").

As for identity theft, the story suggests biometrics authentication ("Lessons Learned"). Even the best biometrics system requires two forms of ID in case one fails. A film over the eyes caused by a cold can interfere with a retinal scan, while residue on the hands can alter a thumbprint.

Neither idea is workable as they would require substantial cost and a rewrite of a whole section of U.S. laws.
Daniel Gray
CEO, Beta Testers Omega, Defiance, Ohio



Cover Your Data Assets
If companies wish to protect their data assets, first they need to come to the realization that data is an asset ("The Long And Winding Road To Security," Nov. 25, p. 8). It has a value that can be placed on it, and a company can't operate without it. The next step is to determine what data needs protecting and then centralize that data.

Today's companies are lacking in this process. They wouldn't let just anyone walk out of a building with a copy machine, but most ignore it when data is downloaded to a laptop and that laptop leaves the building or, worse, when a file is transferred over the Internet.

Data needs to be inventoried and managed no differently than any other physical asset.
Richard Strozewski
President, I-Plus, Westlake, Ohio



Correction
In "Paycheck Meets Reality Check" (Dec. 2, p. 16), Kadiri Inc.'s TotalComp was misspelled.


Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll