Risk
10/31/2007
08:55 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Security Threats Meet Business Treats

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.In fact, the more thought I gave the matter, the clearer it became that the "dark sides of business technology" are more than matched by the bright side of business benefits.

Here, then, my pick of half a dozen gifts tech gives our businesses -- every one of which has, to be sure, its trick-side, but any one of which just as surely is a treat:

1. Technology lets you live your life as well as run your business  those (protected and secure!) mobile devices keep you on top of things all the time on vacation as well as in the office. And you can take longer vacations  as long as youre connected, why not join that conference-call from the beach rather than the boardroom?(The trick side of this one is that your customer know how connected you are: be careful lest youre on call 24/7/365.)

2. On the Web nobody need know youre a small business  as long as you dont misrepresent yourself or overpromise what you can deliver, the right combination of Web site and Web marketing lets you soar above the competition up where the customers surf!

3. You can get your face and your personal insights and ideas out there  blogging and other networking tools let you tell it like you see it (within business reason) and do so with as much reach as any mega-corporation, and without having to slice and dice your way through bigbizs big bureaucracy.

4. Collaboration and teamwork take on whole new levels of meaning  and business benefit. One key to any small or midsized businesss success is teamwork. And team-building has never been easier or richer than with the right array of software and communications tools on your network.

5. IT hasnt brought about the death of office drudgery, but it has vastly diminished the burdens of routine chores  filing, copying and sharing information among departments, records- and bookkeeping. Enter it once  then do with it what you will, and whatever you need to.

6. Sophisticated and powerful technologies cost less than ever  letting you do more, accomplish more, reach for more business while holding onto to more of your IT budget which youll need to apply to security measures against the monsters that are likewise benefitting (if thats the word) from the drop in tech costs and the climb in tech power.

And one more -- being your own boss, or at least being free from the corporate chain gang, lets you take the occasional moment for yourself, Just a bit of time to, say, take another glance at our Halloween business fears feature, Part One and then -- go ahead! -- Part Two.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I decided to treat the kiddos to a TV dinner tonight.
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.