Letters To The Editor - InformationWeek
IoT
IoT
News
Commentary
12/11/2002
12:16 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Letters To The Editor

It's Not Safe Out There
I was amused at the stories on p. 24 of the Dec. 2 issue on the benefits of safe and secure E-mails and how to keep your identity safe.

No program is completely safe, regardless of what it does, where it is, or how well encrypted it is ("Bank Delivers Safe And Secure Messages").

As for identity theft, the story suggests biometrics authentication ("Lessons Learned"). Even the best biometrics system requires two forms of ID in case one fails. A film over the eyes caused by a cold can interfere with a retinal scan, while residue on the hands can alter a thumbprint.

Neither idea is workable as they would require substantial cost and a rewrite of a whole section of U.S. laws.
Daniel Gray
CEO, Beta Testers Omega, Defiance, Ohio



Cover Your Data Assets
If companies wish to protect their data assets, first they need to come to the realization that data is an asset ("The Long And Winding Road To Security," Nov. 25, p. 8). It has a value that can be placed on it, and a company can't operate without it. The next step is to determine what data needs protecting and then centralize that data.

Today's companies are lacking in this process. They wouldn't let just anyone walk out of a building with a copy machine, but most ignore it when data is downloaded to a laptop and that laptop leaves the building or, worse, when a file is transferred over the Internet.

Data needs to be inventoried and managed no differently than any other physical asset.
Richard Strozewski
President, I-Plus, Westlake, Ohio



Correction
In "Paycheck Meets Reality Check" (Dec. 2, p. 16), Kadiri Inc.'s TotalComp was misspelled.


Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll