As for identity theft, the story suggests biometrics authentication ("Lessons Learned"). Even the best biometrics system requires two forms of ID in case one fails. A film over the eyes caused by a cold can interfere with a retinal scan, while residue on the hands can alter a thumbprint.
Neither idea is workable as they would require substantial cost and a rewrite of a whole section of U.S. laws. Daniel Gray
CEO, Beta Testers Omega, Defiance, Ohio
Cover Your Data Assets
If companies wish to protect their data assets, first they need to come to the realization that data is an asset ("The Long And Winding Road To Security," Nov. 25, p. 8). It has a value that can be placed on it, and a company can't operate without it. The next step is to determine what data needs protecting and then centralize that data.
Today's companies are lacking in this process. They wouldn't let just anyone walk out of a building with a copy machine, but most ignore it when data is downloaded to a laptop and that laptop leaves the building or, worse, when a file is transferred over the Internet.
Data needs to be inventoried and managed no differently than any other physical asset. Richard Strozewski
President, I-Plus, Westlake, Ohio
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.