The time it takes for a known vulnerability to be exploited by some sort of malware has fallen precipitously in the past three years. From the time that the vulnerability became known, the Slammer worm took six months to hit, Sasser took three weeks, and the Witty worm took two days. One of 2005
Despite the funny name, phishing is no joke. In the last year, approximately 1.2 million computer users in the U.S. felt the pain of being hooked by a phishing exploit, according to a recent report by the Anti-Phishing Working Group (APWG), an industry association set up to fight this threat. Losses added up to almost a billion dollars.
Outsourcing of IT security services will increase dramatically over the next five years despite fears about turning over the keys to the company to an outside entity. IDC Canada estimates that the market for security services in Canada was $436 million in 2004. By 2009, says Joe Greene, IDC Canada
What are the key elements of an effective data management strategy? And what can SMBs learn from the experience of large enterprises, some of which have been tackling these issues since the 1970s? This is the first in a series of articles that investigates this issue comprehensively.
Graphical representations of data are powerful decision-support tools. Their immediate visual impact and ability to provide context also make them very efficient communications media. For these reasons, graphics have become a staple of business intelligence (BI) applications.
Business intelligence (BI), it seems, has been wrested from the hands of elite business analysts and executive decision makers and pressed into service in call centres, sales forces and other customer-facing service organizations. The early results indicate that this is a winning strategy.