However, there is also disadvantages to using blogs. There has been cases where an employee gone rogue posted irreparable bad publicity on the organization on the web. It was either that case or the one where, the employee, without knowing it, was spreading important information on his blog for competitors to view. All in all, blogs are a good tool for organizations to use as long as it is well monitored.
Friday, November 21, 2008
Blog's Use in an Organizational Context
Nowadays, blogs are used to help organizations get closer to their employees and/or clients. There are numerous uses with blogs that can harm or do good to an organization. The advantage of having an official blog for an organization is the uniformity and timeliness of information. It is easy to use and thus, whenever there is news that need to be spread to the whole of the organization, a posting on the organization's blog will do the trick. Furthermore, it is very cheap to maintain; after all, the blog is basically free, all one needs is a computer and an internet access. The organization can also use blogs to help their clients. Since the blog is open to public view, any questions or comments posted can be viewed by anyone and thus, an answer given can be to the benefit of many.
Cons of biometrics technology for enterprises
There are 2 sides to every coin as they say and this certainly applies to biometrics technology as well.
Here are a few cons to using biometrics:
-privacy
-biometrics sensor's obstacles
The biggest concern with biometrics is probably the privacy issue. With this technology, it becomes increasingly easy to, for example, follow the goings of anyone around the globe (that is, if the system is used at more than one location). By collecting the data of one person, how can this information be secured? After all, identity theft is already a big issue. It is easy to cancel a stolen credit card but in this case, how does one cancel their own identity if stolen? There are other issues concerning privacy which is the misuse of personal information (by the government namely, to use as, say, population control)
The next concern would be the accuracy of biometrics sensors. In some cases, iris scanners can have difficulty recognizing an eye if the lighting isn't exactly the same as when the memory scan took place. This can cause delays and frustrations even though this kind of technology is still new and in the developing stage.
Pros of Biometrics Technology for Enterprises
Even if biometrics is the way to go regarding enterprise's IT security, there are a few skepticals and naysayers.
Here are a few points to consider on the pro side of biometrics:
-convenience
-security
-usability
By using the "old" technology to protect data or other goods, if using a password system, it is only logical that the only upgrade available for that form of protection is implementing a password policy. Meaning the password will be changed every "X" time e.g. every 2 weeks, a new password will be used to be granted access.
This can be very frustrating and inefficient as people tend to forget passwords and if so, would require help to require a new one if forgotten. The convenience of having a biometric security system is the fact that, to be granted access you are your own password. This, of course, enhances security because every human is unique and there is no 2 person alike in this world. Therefore, making it next to impossible for anyone other than the "true" user to access an account, computer, vault, etc. Finally, usability; there are so many different biometrics available that the choice is completely up to the user to choose what is most convenient for them. From leaving fingerprints to iris scanners or even voice recognition, it is up to the user's convenience to use whichever form of biometric he/she wants.
Thursday, November 20, 2008
Out with the Old, In with the New
As technology is evolving at a dizzying pace, it is very important for enterprises to keep up with new security features coming out. The old adage of "you can never go wrong with the old stuff" doesn't apply anymore when it comes to IT technology. From competitors to hackers, there are many people outside one's enterprise that would like to acquire information. Therefore, it becomes very useful to invest in security measures. The old typed in password is not effective anymore as anyone can attain that knowledge e.g. coerced out of someone or hacked from the computer. Thus, to replace the old key to enter a room or even a password to access a computer, biometrics can be implemented to protect sensitive data or an important room containing valuable goods.



Out:
-computer typed-in passwords or PIN

-Access cards or smart cards

-access codes

-security keys
Biometrics will gradually replace these old technologies to protect important data and goods.
What is biometrics?
Biometrics is a new method of human recognition based on people's intrinsic biological or behavioral characteristics. This new IT uses fingerprint, facial, iris, retina, speaker (voice), hand geometry, keystroke, and handwriting recognition for user access as opposed to the standard typed in password. It is basically a tighter form of identification verification.




Biometrics are particularly useful as it is an authentication process that cannot be easily circumvented. Where standard process of access control has failed (passwords, smart cards, keys, or certificates) because it was bypassed by another person who had otherwise obtained the knowledge; biometrics will succeed because it use inherent physical characteristics that cannot be "imitated". Thus, this process tightens security access control.
The following figure shows the biometric authentication process:

Types of biometrics:
As explained earlier, there are several developed biometrics ranging from fingerprint, voice, face, iris and handprint geometry that have their fair share of advantages and disadvantages. When enterprises are confronted with the task of choosing one biometric, although a difficult task, the trick is to choose the right one to implement depending on what needs to be accomplished. Below is another figure of comparison between the most widely used biometrics today:

As the previous figure resumed, fingerprint biometric is basically the imprint of one's fingerprint data stored in a machine that will allow access when recognized (there can only be one match, thus allowing stricter control). Next we have the face biometric which memorizes one's facial structure and characteristics. We follow with the iris biometric which scans one's iris to allow access (rendered very popular by the movie industry as we see it regularly in action movies). And finally we have voice recognition and hand geometry biometrics which memorizes the pattern and intonation of your voice and the lines, shape, length of your hand respectively, to allow access.
Here are a few pictures of popular biometrics:
Below is the fingerprint biometric door lock guardian XL30t

Below is the iris scanner

Subscribe to:
Posts (Atom)