INFORMATION

Site Map - Cybersecurity

Numbers

- 40 Percentage of companies that suffered a business disruption as a result of poor IT support

Phone Forensics

- Though the paper is aimed at investigators who already have some of the skills needed to do computer forensic investigations, it includes much information that will be of value to anyone who is interested in how cellular devices work and how they should be properly seized and analyzed.

Is ID Theft Rare, or Merely Well Done?

- Four widely publicized data breaches resulted in the compromise of around half a million customer names and Social Security numbers. How many of those consumers became victims of identity theft? Almost none—0.098 percent, or less than one in 1,000.

Aligning Security With Business Objectives

- The guidebook provides a five-step approach for CISOs to achieve success in their positions: assess, analyze, strategize, align, and communicate. PWC partner James Quinnild, one of the authors of the guidebook, says that the goal was to help CISOs succeed in a world that has changed dramatically from five years ago.

Has Spam Been Canned?

- Federal Trade Commission (FTC), which is responsible for analyzing the act’s effectiveness and making recommendations for changes, the act has given the FTC, the Department of Justice, and Internet service providers (ISPs) the ammunition to bring dozens of actions against alleged spammers; many of these legal actions are still in progress, but many others have already resulted in settlements.

Riding the Web 2.0 Wave

- Writely is a Web 2.0 site that offers a word processing program in which multiple collaborators can be given access to particular documents, with changes tracked by time and user. Central Desktop is a collaboration tool that allows teams to work together on project management, allowing members to add documents, Web links, comments, and scheduling information. It offers a variety of communications options, including instant messaging and discussion boards.

Quick Bytes: Risky e-mail

- Half of the corporate employees surveyed have saved a work e-mail outside the company network, and almost half have used corporate systems to send jokes, pictures, and “stories of a questionable tone” to friends. Yet 92 percent of these respondents believe that their e-mail use does not pose any risk to their employers.

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site, where you can learn everything you need to know about the newest distributions (called “distros”) of the Linux operating system.

Laws to Aid Breach Victims

- A data breach at ChoicePoint in February 2005 was “a watershed event in terms of disclosure to the affected individuals,” according to a paper from the Privacy Rights Clearinghouse.

Web Sites Provide Rich Harvest for Spammers

- If your e-mail address is posted on a Web site, the chances of it being “harvested” by a spammer are much greater than if the address appears on a blog, on a message board, or in a chat room. That’s one finding from a study conducted by the Federal Trade Commission (FTC), whose investigators created 150 e-mail accounts—50 with an Internet service provider (ISP) that does not use antispam filtering, and 50 each at two other ISPs that do filter for spam—to learn more about how to reduce spam. @ E-mail Address Harvesting and the Effectiveness of Anti-SpamFfilters, a report by the federal trade commission’s division of marketing practices, is at SM Online.

Behind the Numbers

-

Numbers

-

New in Plaintext

- Dan Sullivan, an author and security expert, has penned a comprehensive text that will help readers better understand how these losses occur and how to prevent them. The Definitive Guide to Information Theft Prevention is an eight-chapter e-book available for free (the e-book is sponsored by Permeo Technologies, a provider of secure remote-access solutions)
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.