In This Issue:
1. Editor's Note: Securing A Solution To Data Theft
2. Today's Top Story: Office Updates
- Gates Q&A: Changes Around The Office
- Gates Talks Up The Next Version Of Office
- Gates Vows A New Internet Explorer Every Year--Or More
- Vista Run-Up To Slow PC Sales In 2006
3. Breaking News
- Judge Rules Google Doesn't Have To Turn Over Search Queries
- Kinderstart Sues Google Over Lower Page Ranking
- Google Earth Catches On In The Business World
- CIOs Bemoan Sarbanes-Oxley's 'Big Impact, Little Benefit'
- Virtualization's Next Stage
- Bot Herders Ready Attack Against Message Forums
- Researchers Warn Of Coming Tax Scams
- Policy Group Accuses Companies Of Funding Adware
- Dell To Add 10,000 Workers In India
- Linux Tools To Help Manage Networks
- Review: BlackBerry 8700c
- IBM Beefs Up Storage Arrays
- HP Rolls Out Speedier Servers, New Virtualization Software
4. Grab Bag
- 'Free IPod' Takes Privacy Toll (Wire.com)
- The Great (Cubicle) Escape (Fortune)
- Georgia College Pushes For IPod Ingenuity (AP)
- Geek To Live: Mastering Wget (Lifehacker)
5. In Depth: The Sorry State Of Data Security
- The High Cost Of Data Loss
- Interactive Presentation: Personal Data Sieves
- A Chronology Of Data Breaches Reported Since The ChoicePoint Incident
- Poll: Government And Data Privacy
- Visa Warns Software May Store PINs
- Brazen Botnets Steal From E-Shopping Carts
- Microsoft Vows To Keep Pressure On Phishers
6. Voice Of Authority
- IT Confidential: Choose Your Intrusion--Who's Your Friend?
7. White Papers
- E-Mail Management And Recovery
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription
Quote of the day:
"It has been said that man is a rational animal. All my life I
have been searching for evidence which could support this." -- Bertrand Russell
1. Editor's Note: Securing A Solution To Data Theft
Little wonder. The banks involved in the first story were huge,
with huge IT budgets and even bigger data stores. We all bank and
use ATMs, and many use debit cards. And regards the second story,
most of us shop, to varying degrees, online. It just isn't hard
to imagine yourself as one of the current--or future--victims of
these scams or dubious security policies.
If you had any doubts before reading this package about the depth
and breadth of this issue, it should be crystal clear afterward
that the biggest IT-related problem facing this country right now
is data security.
This issue cuts across, and connects, multiple areas of society:
legislative, law enforcement, social services, commerce,
consumers, and, of course, IT.
It's an issue that must be dealt with if businesses, government
agencies, and our health care system are to realize the cost
savings they dream about, and the services of tomorrow they
promise. If some concrete, serious steps are not undertaken, many
consumers will either step away from the keyboard or never jump
on in the first place. There have already been a number of polls
and studies documenting consumer nervousness about the security
of their data.
My blog entry goes into greater detail
about what I think we need to do in order to get a grip on this
gargantuan and costly problem. What approaches or consequences do
you think should be enacted to combat this problem? Let us know.
Vista Run-Up To Slow PC Sales In 2006
Investment banking firm Lehman Brothers lowered its PC unit
growth forecast to 9.8%, from 12.4%, for this year, in part
because companies are waiting to refresh their hardware until
after Vista debuts.
Researchers Warn Of Coming Tax Scams
A security vendor said that its researchers have monitored a
recent rise in the number of phishing attacks via fraudulent
E-mails and Web sites that spoof the Internal Revenue Service.
Policy Group Accuses Companies Of Funding Adware
After having targeted companies that distribute online ads, a
group now is trying to cut off the revenue they receive from
companies that advertise with them. Those companies often work
through agencies and other middlemen and have no knowledge of how
the ads are actually distributed.
Linux Tools To Help Manage Networks
The software, written in J2EE sitting on a JBoss application
server, promises to automate time-consuming tasks, including
provisioning and deploying updates and backups.
Review: BlackBerry 8700c
RIM's latest BlackBerry, the 8700c, just may be the perfect
single device for all your mobile communications.
IBM Beefs Up Storage Arrays
The DR550 arrays, now with twice the performance of the old
models, are aimed at storing data in a nonerasable, nonalterable
format for compliance purposes.
InformationWeek 500 Entry Call
The InformationWeek 500, an annual study that identifies and
honors 500 of the nation's most innovative users of information
technology, provides a unique opportunity for recognition. If
your company has $500 million or more in annual revenue, register
today for this year's InformationWeek 500.
Linux: Service And Support
Learn how more than 300 business-technology professionals are planning
to use Linux in their IT infrastructure in this recent InformationWeek
Research report, Linux: The Impact Of Service And Support.
Subscribe To Your Favorite Authors
Are you a fan of Fred Langa? Are there other
InformationWeek authors you view as must-reads? Then check
out our all-new authors directory. Each author has his or her own
page and RSS feed.
4. Grab Bag: News You Need From Around The Web
'Free IPod' Takes Privacy Toll (Wire.com)
The big business of renting, selling, and buying personal
information about netizens was put on notice this week by New
York Attorney General Eliot Spitzer in a high-profile case that
exposed shady privacy practices and the dubious value of the
once-promising Truste "privacy seal."
The Great Escape (Fortune)
Forty million American employees toil in soulless cubicles. How
did they get there--and can business ever break out of the box?
Georgia College Pushes For IPod Ingenuity (AP)
Educators at Georgia College & State University worked to find
more strategic uses for iPods. At least 100 of the rural school's
employees are turning the popular digital music and video players
into education or research tools--impressive for a college with
only about 300 faculty. But it's more than simply making class
lectures available--a practice now routine at many colleges and
even a few high schools.
Geek To Live: Mastering Wget (Lifehacker)
Your browser does a good job of fetching Web documents and
displaying them, but there are times when you need an extra-strength
download manager to get those tougher HTTP jobs done.
5. In Depth: Data Security
The High Cost Of Data Loss
Sensitive personal data has been misplaced, lost, printed on
mailing labels, posted online, and just left around for anyone to
see. The situation has become untenable. Here's the ugly truth
about how it keeps happening, who's been affected, and what's
being done about it.
Visa Warns Software May Store PINs
Some point-of-sale software may be storing PINs in violation of
industry rules, Visa says. Fujitsu, one of the vendors involved,
Brazen Botnets Steal From E-Shopping Carts
Two large botnets are hacking into users' online shopping carts
to steal credit card numbers, bank account details, and log-on
passwords, according to a security vendor.
Microsoft Vows To Keep Pressure On Phishers
The company's Global Phishing Enforcement Initiative is a
worldwide effort to coordinate and expand anti-phishing work
through prosecution, partnerships, and consumer protection software.
6. Voice Of Authority
IT Confidential: Choose Your Intrusion: Who's Your Friend?
John Soat is as big a fan of government intrusion as the next
person, but things may have gotten a little out of hand lately,
he says. As examples, he offers up last week's legal contretemps
between the Justice Department and Google, a bill that would
unmask anonymous postings on discussion boards, and a bill that
has outlawed "Internet hunting."
7. White Papers
E-Mail Management And Recovery
A major reason that firms are fall short when it comes to E-mail
archiving/restoration is the technical difficulty involved in the
process. Businesses worldwide are awash in E-mail that needs to
be managed for business, regulatory, and legal reasons. This
paper looks at the difficulties involved in restoring and
searching E-mail archives using Exchange.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.