09/07/2007 - Aligning IT with business goals was the number one challenge facing the majority of CIOs in the public and private sectors, according to a Government Accountability Office report. According to the report, “This challenge requires the CIOs to develop IT plans to support their companies’ business objectives. In many cases this entails cross-organizational coordination and collaboration,” echoing the results from the ASIS study on convergence (see “The Growing Trend Toward Convergence,” page 48).
@ Chief Information Officers: Responsibilities and Information Technology Governance at Leading Private Sector Companies is at SM Online.
09/07/2007 - There are seven steps in a phishing attack, from preparation through successful infection of a victim to the fraud committed using stolen information. Fortunately, there are countermeasures available for each stage. For example, organizations should monitor call volumes and the type of questions customers are asking; a large number of calls regarding password problems can signal a phishing attack. To interfere with the use of compromised information, organizations can use two-factor authentication devices such as biometrics. Instituting delays in some types of money transfers can provide time to detect and void phishing-based transactions.
@ Online identity theft: phishing technology, checkpoints and countermeasures, from the identity theft technology council,is at SM Online.
09/07/2007 - Most of us are lousy decision-makers, and unfortunately many of the decisions that we take as individuals or as a society can be both very wrong and have very harmful or costly consequences. But there are many tried and tested ways of making relatively sound decisions. Cost-benefit analysis, risk management, and related disciplines that rely on statistics, economics, the law, and psychology allow us to weigh choices rationally and increase the odds of making wise choices.
08/24/2007 - In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.
08/23/2007 - China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.