Thinking Outside the Cell: 6 Questions to Ask Yourself About Spreadsheet Security


Click here to download now

Date: July 2009
Type: White Paper
Rating: (4)

Overview: The overuse and abuse of spreadsheets presents a real danger to the security and competitiveness of your organisation. This paper aims to further the debate over the viability of spreadsheets versus commercial business systems by posing 6 questions you should ask yourself if you use spreadsheets to manage your finances, expenses, projects, contracts or resources. It explores the dangers of using spreadsheets and letting them get out of control. In this paper are examples of the very real danger that spreadsheets can pose to any size of company if they are widely used for mission-critical and financial exercises, including a North American power generation company which suffered a loss of several million dollars as a result of a simple spreadsheet error.

The white paper goes on to question the perception of spreadsheets as a 'cheap option' for managing data, challenging managers to really analyse how much time and effort goes into maintaining spreadsheets on their team. Over a resonable period of time, the costs associated with the up-keep of spreadsheets and the loss of man-hours which could be spent on more productive pursuits will outweigh the cost of investing in a commercial business management system.

Not what you're looking for? Search again
Go Advanced »
More From the Information Management Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality

Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++

Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture

Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors

Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy

Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends

Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems

Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention

Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications

Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

More Business Intelligence Resources

ABBYY FlexiCapture Engine Makes Tax Time, Relax Time
Filing taxes can be a hassle and many people put the job off until the last minute for that very reason. However, thanks to Intuit ......

The Executive Guide to Agile BPM: A Readiness Assessment
How adept is your enterprise at optimizing all its business processes — including the dynamic, knowledge-based and collaborative work that drives competitive advantage? Download this white paper and determine whether your business process management solution promotes agility and provides real-time insight into business process performance.

More On Business/Intelligence