No matter how many security
features are available there are no guarantees to ensure that customers will use them to protect their data. Some individuals value time over efficiency and turn off or disable certain security features in order
to speed the performance of their systems. Many people seem to have the " problems won’t happen to me attitude"
and this can lead to a pandora's box a potential problems.
The complacency
of individuals within organizations and at home is one reason why security breaches occur. One particular problem occurs
when employees use company computers for personal use, and as a result, opening up the systems to outside risks.
Misrepresenting Compliance
The fact that
a privacy or security logo is displayed on a business's website does not necessarily ensure compliance with the regulations
governing its use. In fact, the BBBOnLine Reliability logo images located on The
Solutions page were copied from unauthorized sites listed by the Better Business
Bureau. The BBB
listings of unauthorized use of their logo is dated 2003; the websites (http://melancor.com/html/hmw.html
and http://www.aquariumplants.com) are still active and still display the logo. Ironically, a Google
search of "aquarium plants" returns the company Aquarium Plants as a sponsored link from the search engine.
Security Issues
- In the spring of 2006, the SANS Institute released a list
of the eight major trends affecting Internet software security at the time:
-
Rapid growth in critical vulnerabilities being discovered
in Mac OS/X including a zero-day vulnerability (OS/X still remains safer than Windows, but its reputation for offering a bullet-proof
alternative to Windows is in tatters.)
-
Substantial decline in the number of critical vulnerabilities in Windows Services,
offset by flaws in client-side software, including the WMF vulnerability and Internet Explorer flaws, listed in Trend #3.
-
Continuing discovery of multiple zero-day vulnerabilities in Internet Explorer.
-
Rapid growth in critical Firefox and Mozilla vulnerabilities.
-
Surge in commodity zero-day attacks used to infiltrate systems for profit motives.
-
Rapid growth in three types of critical vulnerabilities allowing direct access
to databases, data warehouses, and backup data (Oracle, Veritas Back-Up and SQL Injection attacks).
-
A continuing surge in file-based attacks, especially
using media and image files, Microsoft Excel files, and more.
-
A rapidly spreading scourge of successful spear-phishing
attacks, especially among defense and nuclear energy sites.
- The issues facing individuals and companies that use the Internet
for business or pleasure are complex. As research as demonstrated, privacy and security top the list as concerns. Addressing
these concerns is of prime importance when implementing a successful CRM strategy. CRM software may collect valuable data,
but the hazards associated with its collection need to be assessed based on the solutions available to reduce those hazards.
|