Opinion
Opinion
IT security
-
Policies hold key to social networking security threat
Certain personal online activities can help maintain employee productivity. The question is, when does fair use become a concern for the HR department and line management? Continue Reading
-
Gartner’s at-a-glance guide to social networking risks
Gartner research director Andrew Walls sets out the security risks in using social networks. Continue Reading
-
Social networking security is a people issue
For the corporate body of knowledge, social networking sites can be a leech - is your health and safety record with HR or YouTube is appraisal information best gleaned from FaceBook? Continue Reading
-
Social networking: corporate risks, individual risks
As a result of the strong human desire to connect, social networking websites have encouraged online behaviour where security and privacy are not always the first priority Continue Reading
-
A greater social networking threat on the horizon
How long will it be before one of the social networking sites gives simple remote access from PC to PC? Continue Reading
-
Social networking: would you shout your details in the street?
By using social networking sites, are you not providing potential attackers with a virtual Post-it note to your information, and ultimately your identity? Continue Reading
-
The road ahead for IT security leaders
If CIOs are going to make the most of opportunities for using IT to fuel business transformations and become engaged in experimentation with software as a service, virtual worlds, Web 2.0 and the full realm of other new and emerging technologies, ... Continue Reading
-
Don't panic over 'ban' on security tools
Oh, dear golly gosh, are they going to make computer security tools illegal? Spare me. Continue Reading
-
The positive side of regulatory compliance
When I was working at MCI WorldCom - now Verizon - at the end of 2004, talking to yet another auditor about controls, I did not think that I would ever be looking back with nostalgia. Continue Reading
-
How to combat the Sans Institute's top 10 security threats
Timothy Mullen, vice-president of consulting services at NGS Software, offer advice on protecting your systems from the most pressing cyber threats of 2008 Continue Reading
-
Data privacy must become a corporate priority
Breaching data privacy can cause substantial financial loss The data breach at HM Revenue & Customs (HMRC), which placed 25 million people at risk... Continue Reading
-
Security zone: the trouble with testing anti-malware
Testing products that detect malware are important to the integrity of anti-virus products, but there are several problems that need to be overcome Continue Reading
-
The construction industry is waking up to the Benefits of IT
In general, the construction industry has been reluctant to embrace the benefits of IT. However, builders are now beginning to be dragged into the 21st century by the need to collaborate more closely with their more IT-savvy colleagues, the ... Continue Reading
-
Companies Act 2006 will bring IT closer to business
The Companies Act 2006, which comes into force in October 2009, is reminiscent of the 2002 Sarbanes-Oxley Act in the US. Sarbanes-Oxley has impinged mightily on the working lives of British IT professionals working for companies listed in the US, so... Continue Reading
-
Your shout: readers share their views
Missing CDs, HSBC's fraud initiative, Abbey's system problems, social engineering Continue Reading
-
DPM's Diary: 27 November 2007
Catch up with events from Bogcaster Council Continue Reading
-
Your shout: Mifid, the UK's education system, IT estate measurement, political representation of IT
Mifid, the UK's education system, IT estate measurement, political representation of IT, NHS data sharing Continue Reading
-
Getting IT back on political agenda
Twenty five years ago IT was seen as the "meta-technology" of the future and punched well above its weight politically. Today, society is critically dependent on online systems, but the political influence of the IT community is negligible. Continue Reading
-
Your shout: Vista apps delay, virtualised apps, asset management, security spending
Vista apps delay, virtualised apps, asset management, security spending Continue Reading
-
Tips for IT project success: beware technology obsession
As systems professionals, we are often greatly enthused by new or emergent technologies, tools or techniques. We also have a natural inclination to reach for the technology button when confronted with a major process challenge. Understandably so, as... Continue Reading
-
Secure IT is critical to the modern law firm
Law firms make massive use of technology - anyone still under the quill-pen illusion should prepare themselves to be disillusioned. Continue Reading
-
Remember lessons of 9/11
The phrase "September 11" will always fail to do justice to its referent. In the months that followed the attacks on the World Trade Center, many a jaded IT journalist found themselves automatically deleting press releases that included the phrase ... Continue Reading
-
US iPhone hacker eyes a more cerebral challenge
Hacking the brain should be simple for George Hotz (aka geohot), the 17-year-old student who first unlocked Apple's iPhone, making it usable on GSM networks other than AT&T's. Continue Reading
-
Time, the great concealer
The general media has a limited appetite for the disclosure of "historic" information. Computer Weekly has been registering evidence that the UK government is becoming evermore skilful in playing on that lassitude and laziness. Continue Reading
-
Learn from mistakes made in US security
Think the US does IT security best? Think again Continue Reading
-
Your shout: NHS IT, the value trap, NPfIT
Readers discuss working in IT for the NHS, CIOs stuck in the value trap and the NPFIT in the light of recent terror attacks Continue Reading
-
Better to be safe than sorry with security
CIOs must take action now to avoid problems later Continue Reading
-
Downtime: Nasa, Tim Berners-Lee, botnets
A lighter take on Nasa's IT difficulties, Tim Berners-Lee's Order of Merit, and the FBI's advice regarding botnets Continue Reading
-
PCI: a lesson worth sharing
Large UK retailers, such as John Lewis and Tesco, have shown a relaxed, in control, strategic approach to meeting the Payment Card Industry Data Security Standard. Continue Reading
-
Secrecy and abuse of trust
Lord Falconer, the lord chancellor, said of the Freedom of Information Act, "The more there is a culture of openness, the better decision-making will be." He promised a "change in way we are governed" because "real, informed accountability improves ... Continue Reading
-
Security begins with the reception desk
A security policy is no help if nobody is listening Continue Reading
-
Brown must cut red tape
UK businesses face an ever-growing mountain of legislation. Although the more ludicrous moves - such as the spy in your rubbish bin - are understandably ridiculed in the national press, much of this is well-intended. Continue Reading
-
Your shout: SLAs must focus on business, data protection, agile methods could boost NHS IT scheme
Computer Weekly's readers give their views on the weeks news Continue Reading
-
Information security: Who can you trust?
There is no single answer to internet authentication, and businesses must employ different internal systems to meet requirements Continue Reading
-
The human factor is key to good security
Forget about attacks through your firewall. What about the guy who phones up the IT helpdesk, pretends to be a senior manager and gains access to your information that way? This is social engineering - exploiting human vulnerabilities rather than ... Continue Reading
-
Newer is not always better
It is good to see older systems still going strong in spite of all the efforts of IT suppliers to encourage users to upgrade to the latest version. Continue Reading
-
High price of failing to tighten IT security
Security policies are useless if not backed by action, says Kenneth Mullen Continue Reading
-
IT systems evolve, but the challenges remain
The hurdles faced by PC pioneers in delivering affordable, usable and manageable computers are still very much at the heart of modern IT Continue Reading
-
Embrace the new era of IT
The past 40 years have witnessed a steady transformation in the way computers are used and who has ultimate control over IT. Continue Reading
-
Time to put security first
With each new generation of software, it seems that designers introduce yet more challenges for IT security - usually in the name of "usability" or "productivity". Continue Reading
-
DPM's diary: 23 January
Monday: "I really don't know what all the fuss is about. Data sharing within the public sector is a matter of common sense. All that wishy washy data protection is so 20th century." Continue Reading
-
Downtime: Satnav thriller as bank shows us the money
Downtime has never used satnav. We were put off by all the tales of people being directed off cliffs and suchlike. Continue Reading
-
Infosecurity and IT ops are on the same side, so let's act like it
Bridging the divide between the information security and operations teams would benefit both sides, the IT department and the business as a whole Continue Reading
-
The productivity challenge: Working with the iPod generation
Implementing policies that are enabling rather than restrictive can help attract and retain high quality staff, while still ensuring productivity and security Continue Reading
-
IPv6 offers data packet security and quality of service – but so does IPv4
Don't expect major security and quality gains with new Internet Protocol Continue Reading
-
Your shout: The great ID cards debate
Computer Weekly readers have their say Continue Reading
-
A suitable case for treatment
Insufficient testing is the bane of many a promising IT project, but in most cases it leads to nothing more than frustration on the part of the end-user. Continue Reading
-
Who will foot the bill for ID card fraud?
Government looks set to push liability on business Continue Reading
-
Does Vista show us the path to safer IT?
Ibukun Adebayo outlines the dangers of Microsoft's Jack-of-all-trades approach Continue Reading
-
Manage people, not technology
People are the crucial factor in organisational change, and only by understanding what motivates them can you ensure a major project's success Continue Reading
-
Who's liable for ID cards?
The government is pitching ID cards as a solution for identity theft. But industry needs to recognise that the current approach represents a much greater risk of identity theft liability for businesses, who will be left to pick up the costs if ... Continue Reading
-
Your shout: IT heroes, free data, cool datacentres
Computer Weekly readers have their say Continue Reading
-
Secure web use for all, without walls
Few companies would lay claim to being able to protect all end devices. So in a deperimeterised environment a holistic approach to web access is required, says Paul Simmonds Continue Reading
-
Do you know where all your data is?
Changes to the law mean that organisations will be required to account for all their data and documents in the event of litigation, says Bill Onwusah Continue Reading
-
Information security means better business
It's time for an ongoing dialogue with the board Continue Reading
-
Educate the IT amateurs
Everybody is an IT expert these days. It makes you wonder why any company bothers employing an IT director or a security specialist when everyone on the staff not only knows the word firewall but has their very own implementation at home. Continue Reading
-
Spotlight on data security
With the recent Dispatches documentary on Channel 4 once again fanning the flames of anxiety around data theft, firms would do well to use the publicity as a wake-up call and turn the security spotlight on themselves. Continue Reading
-
See the bigger picture on data security
Don’t let suppliers put the blinkers on – even the best electronic security won’t safeguard your data if the physical aspects of protection have been overlooked Continue Reading
-
Why we must shout about our IT security
Promote security measures to reassure customers Continue Reading
-
Avoiding nasty contract surprises
Taking some time to review the supplier's terms early on can help you to avoid contractual traps and get the most from your software licensing agreement, says Jimmy Desai Continue Reading
-
Don't stay in denial on information risk
Boards must lead from the front on data security, says Ian Wylie Continue Reading
-
Checking the form on file formats
Ensuring data is widely accessible is a key concern for all businesses, says Jack Schofield Continue Reading
-
The four domains of data security
Security professionals are expected to be proficient with a range of security techniques, but which qualifications do you need to progress your career? Continue Reading
-
Punish real cyber villains
New readers of this publication will have much sympathy for hacker Gary McKinnon who was recommended for extradition to the US by a judge last week. But the wise will question the effect McKinnon’s potential sentence will have on those tempted to ... Continue Reading
-
Strategy clinic: How to win over business leaders to enterprise-wide data security
Our panel of experts offer advice on IT management dilemmas. This week: gaining a managing director’s commitment to system security Continue Reading
-
Storage: Win the generation game
Companies need to look ahead to make sure that the data they are storing today can be accessed tomorrow, and that it remains secure over the long term, says Cliff Saran Continue Reading
-
Weighing up the security options
Vision is vital, but dogma can be disastrous. This holds as true in IT security as in life generally, and it should be remembered by all those at this week's Infosec conference as they thrash out the merits and possible drawbacks of ... Continue Reading
-
Give Soca clout to tackle e-crime
Unveiling the Serious Organised Crime Agency (Soca) on 1 April may not have given the latest addition to the UK's army of crimebusters the most auspicious of starts. It has certainly left the agency open to obvious quips about the timing of its ... Continue Reading
-
See security as a resource
The boardroom is recognising that direct threats to the health of the business are increasing in volume and sophistication, but is less clear on how to be responsible with information security risk. Continue Reading
-
Good governance will deliver BPO success
Business process outsourcing deals need to be grounded on a clear understanding of how governance procedures and metrics align between all partners Continue Reading
-
Limits of token gestures
When talking about authentication, two-factor means something you know and something you have. Continue Reading
-
Ensure it's not your fault
Criminal hacking is on the rise and threatening the security of domestic and international business, but firms must be careful that their own negligence does not contribute to the problem. Continue Reading
-
Ensure data doesn't leave with your staff
If your data or developments would be at risk when an unscrupulous employee leaves, take a lesson in self-defence, and be ready to act promptly Continue Reading
-
Brown's budget cuts rely on IT
As the smoke clears after Gordon Brown's budget last week, it is clear that the chancellor is relying on IT to deliver cost savings across Whitehall. Continue Reading
-
Leaving do for your data?
What happens in your company when an employee leaves, taking customer or database information, copies of programs or code, or business-critical information? Continue Reading
-
Why time is the vital ingredient
IT directors of pension providers have spent much of the past year working to prepare for the simplified pensions tax regime. Continue Reading
-
Thin line between advertising and spying
Although the legal issues surrounding adware and spyware have yet to be fully examined in UK courts, the Data Protection Act and copyright laws can provide guidance Continue Reading
-
IT due diligence can be a clincher
Buyer beware is always a useful adage, but times are changing and it is no longer enough. Continue Reading
-
Review of computer misuse laws essential to keep up with rapidly developing market
Participate in consultation to develop most effective computer legislation Continue Reading
-
Revenue must learn to say no
It is time for the leaders of Her Majesty's Revenue and Customs to spell out some home truths to ministers and opposition politicians. The staff and systems at HMRC cannot cope with more rapid change. Continue Reading
-
Opinion: Are you ready for a crisis?
Business leaders must beware creeping complacency. Continue Reading
-
Business data follows where blog feeds lead
An important bit of the business data infrastructure is now being decided in the "blogosphere" - that amorphous cloud of interlinked personal weblogs that mainly seems to consist either of geeks or teenagers writing about their personal lives. Continue Reading
-
True meaning of partnership
Only a fool would dispute the importance of getting the written contract right in any major business relationship. But the relationship will always be more important than the contract if things are to go well rather than fall into dispute mode. Continue Reading
-
Revenue IT still has a hill to climb
HM Revenue and Customs was coy late last year about listing its IT-related achievements. Aware that its chairman David Varney and chief information officer Steve Lamey had enjoyed some success with IT-enabled reforms, we had asked its officials for ... Continue Reading
-
Inside the hacker's mind
Crime prevention requires a non-academic approach, says Ian Johnstone-Bryden Continue Reading
-
Outsourcing: keeping divorce private
Public outsourcing failures could be laid bare by FOI, says Renzo Marchini. Continue Reading
-
IT departments do the business
IT has proved its worth in 2005. In many organisations it has been a year of significant achievements, a year when IT enabled business innovation and business agility while showing prudent control of budgets. Continue Reading
-
Ten steps to get a grip on your IT spending
Working smarter, not harder is the key to cutting the corporate IT budget. Simplify your department and take on the right projects to reap the financial benefits. Continue Reading
-
IT managers must measure up or lose out
IT managers must measure up or lose out Continue Reading
-
Watch your KPIs as new law starts to bite
The Operating and Financial Review (OFR) has become a legal requirement for all UK quoted companies for financial years beginning on or after 1 April 2005. Continue Reading
-
Protect yourself and get the best out of outsourcing deals with India and China
There are several legal issues that companies need to consider in order to get the best from their offshore outsourcing arrangements with India and China. Continue Reading
-
What makes a good chief security officer?
The qualities and skills of an effective chief information security officer include strong ethics, professional qualifications and the right experience, says Richard Starnes Continue Reading
-
Not all dangers have a headline
The crash of the trading system at the Tokyo Stock Exchange because of a software problem offers a timely reminder that disaster recovery and business continuity planning are essential not simply because of the more sensational incidents such as ... Continue Reading
-
Beating the USB burglars
Policies are needed to counter removable media risks, say John Rostern and Jared Landin Continue Reading
-
Getting serious about security
Security is a topic that raises strong emotions among IT managers. Ask any one of them what they think should be done to improve the state of corporate security and you are likely to elicit one of two pessimistic opinions. Continue Reading
-
Dangers of compromise
Stephen Castell, in his opinion piece (Computer Weekly, 13 September), related an all too familiar chain of events leading to a systems disaster, and eight points at which warnings should be seen. The problem almost certainly started way before his ... Continue Reading
-
Licensing: Do not become a target
Beware licence complications of second-hand software, says Quentin Archer. Continue Reading
-
Your shout: Security is everyone's responsibility, e-recycling
Computer Weekly readers have their say. Continue Reading
-
No jobs for the bad boys
Can there ever be such a person as an ex-hacker?, asks Mark Hanvey Continue Reading
-
A question of quality
It is good to see Oracle's chief security officer, Mary-Ann Davidson, admit that the IT industry's biggest challenge is software quality. With users needing masses of patches to manage, the industry is at the bottom of the curve of software quality,... Continue Reading