With the increased sophistication and proliferation of spyware/adware, phishing, and virus attacks, the only way to effectively defend a company is by including employee education in the protection arsenal ("Employees Get Lesson In Spyware Prevention," March 7, 2005).
Online threats evolve faster than the ability of software- and hardware-protection methods. Savvy users can fill the gap, effectively blocking attacks, if they're given the tools to recognize potential threats. The need for employees to remotely access business resources and the inability to control their home computer systems provide additional impetus for employees to be as sophisticated as the attacks targeting them.
IT Manager, Precision Devices
Know The Risk
It's troubling that almost half the companies in InformationWeek Research's Outlook survey don't have a "consistent framework" for measuring the risk level of IT projects ("Tech Investments Take Time To Thrive," Feb. 28, 2005). But what's truly scary is that a high percentage of these projects end up as partial or complete failures. Isn't this the textbook definition of "reckless behavior"?
CEO, Asuret, Brookline, Mass.
Life And Death IT
Until we look at IT as a tightly managed, standardized, and certified career, the recommended changes will never occur ("Stand And Deliver," Feb. 21, 2005). We build highways and buildings utilizing engineers who are required to get a four-year degree and follow published professional and agency guidelines. These engineers are subject to reviews by independent inspectors to ensure public safety.
You'd think the public would begin to understand that some computer systems could have the same impact on their lives as a failed bridge.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.