Thursday, September 29, 2005

Mailbag: The cons of providing e-mail to all workers

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
09/29/05
Today's focus: Mailbag: The cons of providing e-mail to all
workers

Dear networking.world@gmail.com,

In this issue:

* Readers against universal e-mail
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Postini
Free Webcast: Risks of Unmanaged IM

Join messaging expert Michael Osterman for an insightful, live
discussion on the growing threats associated with Instant
Messaging in your enterprise - and what to do about them. Learn
how to locate vulnerabilities ... protect against IM-borne
threats ... ensure regulatory compliance within IM ... and
implement integrated electronic message management.
http://www.fattail.com/redir/redirect.asp?CID=115915
_______________________________________________________________
REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

http://www.fattail.com/redir/redirect.asp?CID=115653
_______________________________________________________________

Today's focus: Mailbag: The cons of providing e-mail to all
workers

By Michael Osterman

Last time, we heard from readers who were for the idea of
providing e-mail to all workers. This time we hear from those
who don't believe that all workers should have this capability.

Here are some responses:

* "I don't believe all workers should have e-mail on the
workfloor. But YES, you can provide them with e-mail at home to
provide them browser-based [e-mail] with company information.
Put the burden of anti-virus/spam at the provider. As we all
know, e-mail at the workplace/desk will consume a lot of time
with too much 'not-to-the-(business) point' communication!"

* "There are far more practical and economical means of
collaboration, including instant messaging, secure document
repositories and electronic bulletin boards. In fact, I have
found that employees collaborate far more efficiently when
e-mail is replaced by these other means of synchronous and
asynchronous collaboration. Furthermore, I find that these other
methods require far less effort to protect against all types of
computer attacks."

* "The feeling here is that if you want to e-mail your friends
and family, then go home. E-mail at work is to be used as a tool
to perform your task. If the user does not need outside e-mail
access, they will not get it. This appears on the surface to be
a bit harsh compared to other state agencies, but we have yet to
get infected with an e-mail-borne virus."

* "We maintain our own Exchange server with approximately 150
mailboxes. We debated this issue a couple of years ago and
decided to change our strategy from a default that provided all
employees with e-mail to one that did not. The decision was
triggered by several factors: a) our population is predominantly
nurses - we found that the vast majority never used their
external e-mail accounts; b) we were experiencing a huge
increase in the number of virus-infected e-mails being caught by
our virus filter agent - it had become obvious to us that many
people were ignoring our policies and guidelines regarding the
steps needed to protect our network; c) we don't monitor e-mail
routinely, but several situations made us aware that people were
not adhering to our policy regarding personal use of e-mail."

Thank you to everyone who commented on the newsletter.

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlmsg7719>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlmsg7868>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlmsg6958>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlmsg7869>
5. The rise of the IT architect
<http://www.networkworld.com/nlmsg7324>

_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115987
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
A resilient Active Directory deployment is critical to your
enterprise network. And resilient AD depends entirely on
effective deployment, maintenance, and monitoring of DNS.

Learn how to most effectively provide DNS services in Active
Directory. Join Infoblox, NetPro, and Network World for the free
webinar, Best Practices for Building Resilient Active Directory
Infrastructure at:
http://www.fattail.com/redir/redirect.asp?CID=115735
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: