Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/31/2007
08:55 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Security Threats Meet Business Treats

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.

Having written so much about the horrors small and midsized businesses face for our two-part Halloween business terrors feature, I couldn't resist the temptation to give some thought to technology treats.In fact, the more thought I gave the matter, the clearer it became that the "dark sides of business technology" are more than matched by the bright side of business benefits.

Here, then, my pick of half a dozen gifts tech gives our businesses -- every one of which has, to be sure, its trick-side, but any one of which just as surely is a treat:

1. Technology lets you live your life as well as run your business  those (protected and secure!) mobile devices keep you on top of things all the time on vacation as well as in the office. And you can take longer vacations  as long as youre connected, why not join that conference-call from the beach rather than the boardroom?(The trick side of this one is that your customer know how connected you are: be careful lest youre on call 24/7/365.)

2. On the Web nobody need know youre a small business  as long as you dont misrepresent yourself or overpromise what you can deliver, the right combination of Web site and Web marketing lets you soar above the competition up where the customers surf!

3. You can get your face and your personal insights and ideas out there  blogging and other networking tools let you tell it like you see it (within business reason) and do so with as much reach as any mega-corporation, and without having to slice and dice your way through bigbizs big bureaucracy.

4. Collaboration and teamwork take on whole new levels of meaning  and business benefit. One key to any small or midsized businesss success is teamwork. And team-building has never been easier or richer than with the right array of software and communications tools on your network.

5. IT hasnt brought about the death of office drudgery, but it has vastly diminished the burdens of routine chores  filing, copying and sharing information among departments, records- and bookkeeping. Enter it once  then do with it what you will, and whatever you need to.

6. Sophisticated and powerful technologies cost less than ever  letting you do more, accomplish more, reach for more business while holding onto to more of your IT budget which youll need to apply to security measures against the monsters that are likewise benefitting (if thats the word) from the drop in tech costs and the climb in tech power.

And one more -- being your own boss, or at least being free from the corporate chain gang, lets you take the occasional moment for yourself, Just a bit of time to, say, take another glance at our Halloween business fears feature, Part One and then -- go ahead! -- Part Two.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.