June 01, 2007 | SC Media

Print Issue: June 01, 2007

Educating the masses for IT security

Never mind the Fourth of July, New Year’s Eve or even his birthday. The occasion George Dolicker celebrated most merrily last year was International Computer Security Day. After all, the 19-year-old annual event marked the day that Dolicker, chief information security officer of computer maker Lenovo, unveiled the company’s first home-grown information security program, complete with a comprehensive user education component.

Google Apps has its advantages, but is it secure?

Can Google guarantee safe, secure online word processing and spreadsheet collaboration applications to enterprises? While only time will tell, the short answer appears to be yes. Google’s new Google Apps Premier Edition — which offers enterprise-focused versions of Gmail, Google Talk instant messenger, Google Calendar, Docs & Spreadsheets, Page Creator, and Start Page via the Web — is really nothing more than software as a service (SaaS), or on-demand offering, popularized by Salesforce.com and others.

How IT departments are securing instant messaging

Once considered a peripheral communication tool used primarily by only some workers, instant messaging (IM) is now feared by many as a security hazard. For many enterprises, the simple solution was to block IM and force employees to use existing email, phone and fax resources. But the evolution of communication channels is leaving that model in the dust.

Product section: Anti-malware management, anti-spyware and anti-virus

To the perhaps clichéd title of this months column, we can add bots, root kits, spyware and other assorted beasties that now crawl the internet. Todays malware is, arguably, the number one threat on networks of all shapes, sizes and persuasions. It used to be that we talked about malware and blended threats as if they were things separate from each other. Today, there are nearly no distinctions between the two. The malware has become the blended threat.

This month’s special test offerings

Welcome to our Malware Special, in which our product reviews cover solutions that can help you address one of the granddaddies of internet security threats. And although these pages are a deviation from our typical product reviews format, thats what makes them special. In an attempt to get a more comprehensive view of this huge market, we decided on a different approach and enlisted the help of sister company West Coast Labs for two Group Tests. The reasons are simple.

News briefs

Fed breach lawA federal ID theft task force backed a breach notification law on government use of personal information. The President’s Identity Task Force, co-chaired by Federal Trade Commission Chairwoman Deborah Platt Majoras and Attorney General Alberto Gonzales, urged lawmakers to educate customers, as well as back a federal ID-theft law.

Company news

Exploit Prevention Labs, a web security firm, has promoted Chris Weltzien to president. He previously served as chief operating officer since the company was founded in 2005, and will now help lead the companys growth strategy in the safe surfing software market.

The cost of e-gold falling

If you felt the floor shake after the feds helped indict the owners of e-gold on money laundering charges, it might be attributable to an underground fraudster community in panic mode.

Me and my job

How do you explain your job to non-technical people?I’d say that I’m the person where the “buck stops here.” My semi-official role is to be risk mitigator of a network that contains sensitive information. In that role I try to also influence my industry and peers to do a better job. In the past, I’ve been chair of the Technology Committee of the California CPA Society, and used my time to educate fellow certified public accountants on the risk of running systems with full administrative rights. I set up the website threatcode.com to help educate fellow technical CPAs and assist in getting vendors to change their ways.

Next post in Opinions