NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
08/04/05
Today's focus: Making the case for e-mail encryption isn't
always easy
Dear networking.world@gmail.com,
In this issue:
* One organization's resistance to e-mail encryption
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Ciena
NetworkWorld Special Report - The Adaptive WAN: The factors
driving WAN evolution
A combination of business and technology trends are changing the
demands on the enterprise WAN. This NetworkWorld Special Report
explores some of the key business and technology trends that are
driving and enabling the evolution of the enterprise WAN and how
the enterprise WAN can become adaptive to support these trends.
http://www.fattail.com/redir/redirect.asp?CID=109214
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS - SIGN UP NOW!
Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! SUBSCRIBE TODAT AT:
http://www.fattail.com/redir/redirect.asp?CID=109079
_______________________________________________________________
Today's focus: Making the case for e-mail encryption isn't
always easy
By Michael Osterman
I received an interesting message from a member of our survey
panel in Australia, a message that really highlights the
difficulty of deploying secure and encrypted messaging in some
organizations.
Here it is:
"About a week ago, I noticed that our CEO had sent some highly
sensitive information by e-mail, and I sent a broadcast to all
staff reminding them that any e-mails sent unencrypted over the
Internet are available to anyone who wants to intercept them. As
a general rule, confidential information is accessed via our
extranet, which requires a login and has SSL encryption.
"I was later questioned about the memo at a management meeting.
The initial response was, 'We don't want PGP; we'll just use
Microsoft Word's password feature.' I then explained the reason
for calling these passwords '45-minute passwords' ([so called
because of] the time it takes to break a longish one using
software freely available on the Internet).
"I was then told that our staff would continue to send via
e-mail because it was convenient. My response was simply that
our new e-mail system makes it impossible to delete anything. My
reminder to all staff would be stored permanently there, and
that if anything was compromised by our people in the future,
the legal team of other institutions would have access to our
e-mail and could easily identify the culprit (dead silence).
"Finally I was told, ok, we obviously need to do it... perhaps
we can see how the Australian legal firms are handling this
problem, and follow their lead.
"I've spent the better part of today talking to the IT managers
of various large legal firms in Australia, and despite the fact
that I've found numerous Australian legal resources warning of
the dangers, and that the Australian government seems to have
put out recommendations of their own, I have yet to find anyone
who is using any form of encryption on their outbound e-mail.
The best I've got are people who are looking at using WinZip
passwords, and people who are investigating the technology, but
believe that it is still too immature."
This points out a couple of things. First, it's absolutely
critical for some functions within an organization to have easy
and ready access to secure e-mail for sending confidential
documents, employee information and the like. Not only is this
good practice, but also it is increasingly required by statutes
like the Health Insurance Portability and Accountability Act,
Gramm-Leach-Bliley, and so forth. Second, some organizations
don't seem to want to address a problem before getting burned by
it; most organizations have not suffered a serious breach of
their e-mail system by hackers or snoops, and so seem loathe to
implement secure messaging to prevent a problem that they do not
perceive as sufficiently serious.
I'd like to get your thoughts on the difficulties surrounding
deployment of secure messaging - please drop me a line at
<mailto:michael@ostermanresearch.com> Many thanks to the
individual who provided the basis for this article.
The top 5: Today's most-read stories
1. Leaked Cisco slides pulled after legal threats
<http://www.networkworld.com/nlmsg4394>
2. Gartner: Bank card fraud too easy for phishers
<http://www.networkworld.com/nlmsg4395>
3. BellSouth cuts DSL pricing
<http://www.networkworld.com/nlmsg4396>
4. Cisco vulnerability posted to Internet
<http://www.networkworld.com/nlmsg4397>
5. Google now a hacker's tool
<http://www.networkworld.com/nlmsg4398>
_______________________________________________________________
To contact: Michael Osterman
Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by Ciena
NetworkWorld Special Report - The Adaptive WAN: The factors
driving WAN evolution
A combination of business and technology trends are changing the
demands on the enterprise WAN. This NetworkWorld Special Report
explores some of the key business and technology trends that are
driving and enabling the evolution of the enterprise WAN and how
the enterprise WAN can become adaptive to support these trends.
http://www.fattail.com/redir/redirect.asp?CID=109213
_______________________________________________________________
ARCHIVE LINKS
Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
Four steps to achieving real customer insight - Webcast
Do you want to improve the quality of your customer data? Learn
how you can create a unified, enterprise wide view of customers
so you can provide better service, improve customer relations,
and increase sales and more.
http://www.fattail.com/redir/redirect.asp?CID=109099
_______________________________________________________________
FEATURED READER RESOURCE
HARD WORK, GOOD PAY
According to Network World's 2005 Salary Survey, network
professionals are enjoying substantial increases in pay,
especially at the highest- and lowest-tier job titles. But are
those increases coming with higher titles, more work or both?
Find out if compensation alone is keeping network professionals
happy in their careers - or is something else? Click here:
<http://www.networkworld.com/you/2005/072505-salary-survey.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment