Apply Offline Security Lessons to E-Assets
The goal is to look good to customers, not to impress the audience at an IT conference.Do you protect yourself against hackers by crossing your fingers and hoping for the best? Thats the strategy of choice, it appears, for more than a third of the thousands of eWeek online readers whove replied to our poll on this subject. Even if our poll respondents (see results at www.eweek.com ) were being flippant in their answers, we all need to apply the hard-learned lessons of the offline world to protect our e-assets. Our poll asked only about active measures, such as software-based ID systems or hardware intrusion detection appliances, but we should also look at the entire spectrum of risk-reduction measures that we use—without even thinking about them—in our other business and personal activities.
A physical storefront, for example, can protect itself against defacement of its windows with an elaborate system of infrared beams and electronic links to armed-response security services. It would be more cost-effective, though, to use storefront materials that are easy to clean, depriving graffitists of the satisfaction of seeing their work displayed. After one or two disappointments, theyll look elsewhere.