Risk
10/31/2007
08:55 AM
Keith Ferrell
Keith Ferrell
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Security Threats Meet Business Treats

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.In fact, the more thought I gave the matter, the clearer it became that the "dark sides of business technology" are more than matched by the bright side of business benefits.

Here, then, my pick of half a dozen gifts tech gives our businesses -- every one of which has, to be sure, its trick-side, but any one of which just as surely is a treat:

1. Technology lets you live your life as well as run your business  those (protected and secure!) mobile devices keep you on top of things all the time on vacation as well as in the office. And you can take longer vacations  as long as youre connected, why not join that conference-call from the beach rather than the boardroom?(The trick side of this one is that your customer know how connected you are: be careful lest youre on call 24/7/365.)

2. On the Web nobody need know youre a small business  as long as you dont misrepresent yourself or overpromise what you can deliver, the right combination of Web site and Web marketing lets you soar above the competition up where the customers surf!

3. You can get your face and your personal insights and ideas out there  blogging and other networking tools let you tell it like you see it (within business reason) and do so with as much reach as any mega-corporation, and without having to slice and dice your way through bigbizs big bureaucracy.

4. Collaboration and teamwork take on whole new levels of meaning  and business benefit. One key to any small or midsized businesss success is teamwork. And team-building has never been easier or richer than with the right array of software and communications tools on your network.

5. IT hasnt brought about the death of office drudgery, but it has vastly diminished the burdens of routine chores  filing, copying and sharing information among departments, records- and bookkeeping. Enter it once  then do with it what you will, and whatever you need to.

6. Sophisticated and powerful technologies cost less than ever  letting you do more, accomplish more, reach for more business while holding onto to more of your IT budget which youll need to apply to security measures against the monsters that are likewise benefitting (if thats the word) from the drop in tech costs and the climb in tech power.

And one more -- being your own boss, or at least being free from the corporate chain gang, lets you take the occasional moment for yourself, Just a bit of time to, say, take another glance at our Halloween business fears feature, Part One and then -- go ahead! -- Part Two.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.