So, here we are at the start of a new year. And what has this past year brought us? A few things have changed compared to last year’s review and some things haven’t. How’s that for a generalized statement?
Two things still stand out as highlights (or lows) for the past year: phishing and the lessons taught by Katrina.
Phishing and pharming, or more specifically identity theft, were made headlines early in the year. They continue plague many financial institutions and e-commerce websites. The number of phishing attempts or variants continues on an upward trend. December 2004 came and went with 8,829 reported incidents to the Anti-Phishing Group, while last month (December 2005) that number is 15,820, with some time still on the clock. People are either becoming more aware of the problem, and thus reporting it more, or there are more actual phishing variants out there.
Along with some of the phishing attempts, we have seen the installation of Trojans and other RATs (Remote Access/Administration Tools) onto users machines as methods of getting credit card information. These operate primarily on the user and home user level, but the risk is still there for those that bring home their laptops home and use them to surf.
But even if you did manage to avoid traps like phishing and pharming, you still could be susceptible to credit card information theft due to incidents like those with ChoicePoint, Bank of America and Lexis-Nexus. As I write this, Ford Motor Co., is in the process of notifying 70,000+ of its present and past office workers that their personal data may have been compromised due to a laptop theft in November. The importance of identity and protecting it will certainly be a key resolution for 2006 for many enterprises.
And it should be, given how robust the Internet is today. Yet, we still have some e-commerce sites using insecure ordering forms. For instance, I recently went to place an online order and was rather shocked that this major company, in Canada and using a major search engine to host their store, didn’t employ any encryption at all as I was about to enter my credit card info for a gift certificate.
You would have thought that after 9/11 companies would have realized the importance of using things like warm/hot sites and remote backups. But Hurricane Katrina highlighted many of the flaws in existing disaster recovery and business continuity plans. For those that have them.
Many still don’t even have daily backups that can mitigate relatively minor problems caused by user error, never mind large scale planning. Many enterprises seem oblivious to the fact that if a disaster did occur they’d go bankrupt in seconds because they didn’t take the time to plan and deal with things in advance. Mother Nature has never been known to ask permission before unleashing her fury.
Those incidents aside, there wasn’t much else other than the usual viruses, botnets and other malware running around (spyware). I still contend one of the funniest stories was that of the hacker who broke into US military in hopes of finding proof of hidden UFOs and such. He definitely wasn’t in it for the money. When we look at 2005 it was in many respects a continuation of 2004. Except there was more SOX to worry about, and that’s becoming rapidly a procedural exercise for many administrators.
That all said, what does 2006 hold for us?
Well, 2006 is the Year of the Dog but I think the bite will be just as good as the bark (sorry, had to toss it in).
2006 should also be the year of backup development and disaster recovery planning. 2005 highlighted those issues and many companies are seeing how devastating it can be if they don’t prepare. Options such as hot sites, remote journaling and backup as well as dual-center operations will be the items to look into.
2006 will also be the year of virtualization. The battle between VMWare and everyone else, specifically Microsoft, is starting to heat up. Companies are beginning to realize that virtualization of their many servers into one central location and minimize hardware costs means they can put more money into disaster recovery and backup options.
The New Year will continue to put security on the forefront, in a general sense and career wise. Companies are integrating more security, well beyond simple usernames and passwords, as the need for more stringent methods becomes clear. Additionally, the creation of various laws in Canada, the US and elsewhere is forcing companies to adhere to stricter cyber-security. In the job area, with all these changes that companies are doing they will need experts and specialists to fill roles. Security remains one of the few areas in IT where growth is happening. The CISSP designation is still king of the heap and hotly followed by the SANS GIAC certification and vendor-specific security designations.
However, 2006 will probably still remain victim to the various identity theft issues and phishing will continue to register big on the radar. Because of this, trust in e-commerce will continue to erode for the average consumer. If companies make the effort to provide more secure environment to do business, then the consumer will return.
So here’s to the past year as it reminds of where we need to be careful. And here’s to the New Year with all its hope that things are getting better. Best holiday wishes to all!
This article was first published on EnterpriseITPlanet.com.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.