Comdisco Research Confirms Net Dependence & Inadequate Recovery The
1997
Index@,
Vulnerability
commissioned
by
Comdisco,
-
raises
reliance
on the Internet,
wide-area
networks
exposure
to
intranets
and
-
Internet‘
conducting
system
recently, compar&s using E-inlil are more Iikely to be! vulnerable ~0 libel actions, said a report in Camputer Weekly. The insurer made a I-Ii& Court apology and
applications;
49% of the companies the
may be increasing
corporate-wide
37% of companies are currently using the Internet or intranets for mission-critical
questions about how growing corporate
Plans
as
plan to use vehicle for
a
electronic
commerce.
paid
disruptions. “The
common
vulnerability,”
the
Continuity
network
organization.
presi-
Services.
“A
is the lifeblood
of
A disaster plan that
doesn’t make provisions network
The
is network
said David Nolan,
dent, Comdisco company’s
thread
recovery
the
Vulnerability
Index
also
with
formal
disaster
recovery
plans include multiple geographic
loca-
tions in their recovery
com-
plans.This
The survey’s conclusions
rietary research study commissioned Comdisco
-
Index
is a propby
Only 25% of the companies surveyed
with more than 200 of the largest users in the US, Canada and UK.
for network
Contact:
recovery
- two of the
Diane
LAUX, Comdisco,
tel: [l] E-
Internet Addiction: Disorder or Cyberhoax? Two years ago, NY Goldberg describing
a new addiction
who
preferred
than
socialise
Although
psychiatrist
Ivan
made a name for himself by -
people
surfing the Web with
Goldberg’s
spoof
on society’s
own
addictive
their
fascination
amongst the “netizens”.
was with
it
an
article
Federwisch humour
a its
spread
However, some
just
published
Publishing,
writer
assesses the hoax
highlights
dangers
Internet
use”
how
explain
all the
people
do
seeking
say that they have preliminary
kttp://www.nurseweek.com/features/97-
can
8/iadct. ktml
read
the
story
a story
Libels have to be read by only one per&k
-
Disclaimers your km.
-
Defeced E-mails on the system.
-
Avoid onto a
-
Use confid sensitive mat&aI.
-
Use automa.tic d&G data inaccurate.
that if there is no such thing as “pathological
or be
-
use. It
but points out
ment? You
to support the claim.
and the
of Internet
the scepticism
researchers now insist that people are becoming addicted to the Internet, and research
by Anne
to present an impartial picture
of possible
families.
posting
behaviour,
rather
In
Nurseweek
that
implies
A statement qreed by both sides said: “In the middle of 1995, rumours circulated that Western Provident was insolvent, in financial difficulty and under investigation by the DTI. These rumours were disseminated by some of Norwich Union’s staff via its internal e-mail systems with the re&t &at they could be used to the detriment of Western Provident in order to obtain new business.” The story gave the following Email libel precautions:
(average revenue $2.5 bn)
847 518-5409, (US: 800-272-9792) mail:
[email protected]
internal
treated with the sort of caution
have a detailed written recovery plan or a testing and evaluation program most critical aspects of any disaster recovery program
settlement
that applies to publishing in a newspapa.
and is based on interviews
of technology
Wrstrrn
sending E-mails - inside outside a company - should
already associated with enterprise-wide computing. The Vulnerability
are as follows:
this
the high level of vulnerability
disaster, adding hours and even days to a situation where minutes count.”
to
over libellous
E-mails sent by st&?. Companies must educate their staff over use of E-mail because
revealed only one in three (34%) companies
pounds
for enterprise
only compounds
1997
k4:llsQ,@M
Provident
they treatat:
wi.Il not
protect
may still be
expiry dates to when it is
i
Computer 0
Audit 1997,
Update
$17.00
l
August
1997
Elsevier Science Ltd.
q