As for identity theft, the story suggests biometrics authentication ("Lessons Learned"). Even the best biometrics system requires two forms of ID in case one fails. A film over the eyes caused by a cold can interfere with a retinal scan, while residue on the hands can alter a thumbprint.
Neither idea is workable as they would require substantial cost and a rewrite of a whole section of U.S. laws. Daniel Gray
CEO, Beta Testers Omega, Defiance, Ohio
Cover Your Data Assets
If companies wish to protect their data assets, first they need to come to the realization that data is an asset ("The Long And Winding Road To Security," Nov. 25, p. 8). It has a value that can be placed on it, and a company can't operate without it. The next step is to determine what data needs protecting and then centralize that data.
Today's companies are lacking in this process. They wouldn't let just anyone walk out of a building with a copy machine, but most ignore it when data is downloaded to a laptop and that laptop leaves the building or, worse, when a file is transferred over the Internet.
Data needs to be inventoried and managed no differently than any other physical asset. Richard Strozewski
President, I-Plus, Westlake, Ohio
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.