Risk
10/31/2007
08:55 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Security Threats Meet Business Treats

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.In fact, the more thought I gave the matter, the clearer it became that the "dark sides of business technology" are more than matched by the bright side of business benefits.

Here, then, my pick of half a dozen gifts tech gives our businesses -- every one of which has, to be sure, its trick-side, but any one of which just as surely is a treat:

1. Technology lets you live your life as well as run your business  those (protected and secure!) mobile devices keep you on top of things all the time on vacation as well as in the office. And you can take longer vacations  as long as youre connected, why not join that conference-call from the beach rather than the boardroom?(The trick side of this one is that your customer know how connected you are: be careful lest youre on call 24/7/365.)

2. On the Web nobody need know youre a small business  as long as you dont misrepresent yourself or overpromise what you can deliver, the right combination of Web site and Web marketing lets you soar above the competition up where the customers surf!

3. You can get your face and your personal insights and ideas out there  blogging and other networking tools let you tell it like you see it (within business reason) and do so with as much reach as any mega-corporation, and without having to slice and dice your way through bigbizs big bureaucracy.

4. Collaboration and teamwork take on whole new levels of meaning  and business benefit. One key to any small or midsized businesss success is teamwork. And team-building has never been easier or richer than with the right array of software and communications tools on your network.

5. IT hasnt brought about the death of office drudgery, but it has vastly diminished the burdens of routine chores  filing, copying and sharing information among departments, records- and bookkeeping. Enter it once  then do with it what you will, and whatever you need to.

6. Sophisticated and powerful technologies cost less than ever  letting you do more, accomplish more, reach for more business while holding onto to more of your IT budget which youll need to apply to security measures against the monsters that are likewise benefitting (if thats the word) from the drop in tech costs and the climb in tech power.

And one more -- being your own boss, or at least being free from the corporate chain gang, lets you take the occasional moment for yourself, Just a bit of time to, say, take another glance at our Halloween business fears feature, Part One and then -- go ahead! -- Part Two.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0176
Published: 2015-04-27
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 8.0 before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URI that is included in an error response.

CVE-2015-1886
Published: 2015-04-27
The Remote Document Conversion Service (DCS) in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF16, and 8.5.0 through CF05 allows remote attackers to cause a denial of service (memory consumption) via crafted requests.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.