All About CRM's (a constant balancing act)

Issues
Home
Roles of Operational and Analytical CRM's
Components of Analytical CRM
What Makes CRMs Attractive?
Strategy
Internet Privacy And Security
Issues
Misuse of Data
Passiveness Concerning Security Features
Solutions
References

“Never underestimate the time, expense, and effort an opponent will expend to break a code.” (Robert Morris)

 

 Trites (2004) in 2004 stated that, the Information Technology Advisory Committee (ITAC), a division of the CICA, surveyed roughly 50 individuals who are involved in information technology. These individuals were asked to give feedback on ITAC's list of the most crucial issues facing people in the IT industry. The participants' responses were tallied and showed that information privacy was their #1 concern, followed by the security of wireless systems and network intrusion detection.

 

 Trites (2003) reported that in the 2003 "Computer Crime and Security Survey" of the CSI, 56% of the respondents experienced financial losses due to customer breaches. Within the same survey, 46% of the surveyed people detected system penetration from the outside and 45% from the inside."

Despite the reports published by the SANS Institute and other  agencies, the incidences of malicious Internet use and abuse are, by far, significantly underreported. A security breach can cause numerous probelms for  any organization who has stored information in databases and can quickly undermine the effort that was taken to build user confidence. Many businesses and organizations go to great lengths to cover up and repair the damage done to their systems and client accounts before the information becomes public.