Oh how I long for the days when I would boot up my IBM 8086 PC off of the dual-floppy drives and not have to answer any security questions in order to get to my word processing program. Granted, it was slow… but it was simple. It wasn’t connected to a fast Internet connection… but I was just happy to be able to see the three emails that came in each day. However, time marches on… speeds increase… software upgrades… networks expand… some idiot decides to hack into the system… then the IT world’s version of the TSA begins its march to make sure “our systems” are not hacked. It’s too bad we’ve stopped having “smoke breaks” at work, because each time we log in to our computers, open email, load a template in our word processors, or try to watch YouTube an online training video, we could go outside and light up.

I know, I know… IT Security is needed to keep the bad guys out (and it seems that there are many bad guys out there.) The drawback to this constant war on hackers is that we have all suffered the effects of the long slog against an enemy that simply won’t die… won’t surrender… and adjusts their tactics whenever we’ve had any reasonable success against the existing attacks.

It seems that every year a new layer of security is added. Here’s just a few that come to me off the top of my head:

  • Username/Passwords
  • Advanced Password Requirements (where you have to add CAPITAL letters, Numb3rs, and Sp#cial Ch@racters)
  • Bio metric readers (finger print scanners)
  • Digital Codes on key chains that change every 60 seconds
  • Anti-Virus Software
  • Network Security Devices (anti-sniffer, sniffers)
  • Remote mobile devices wipers
  • Encrypted hard drives
  • Secure WiFi
Everyone of these (and the dozens or so I’m sure I didn’t list) are reactions to security threats that have either happened to your place of work, or to some other place of work and your IT staff doesn’t want to happen to them. Each of these is a burden upon the IT Group, the computer you’re using, the network you are on, and on you and your work production. The end result is that we have a fight between Moore’s Law and the Red Queen’s Hypothesis:

Speeds Double Every 18 Months…
But, We Need Them To Double Twice That Fast To Get Anywhere!!

I would have hoped by now that we would have things like automated security, instant boot-ups, programs that don’t move slower than their Windows 95 versions, tri-corders and food replicators… but alas, we do not. We seem to be stuck in an information world that is stuck marking time in a battle where winning is defined as simply not losing. I have to go now… my email program finished loading… and I have to make sure Postini didn’t capture any emails that I actually need to read.

Print:
EmailTweetLikeLinkedIn
Photo of Greg Lambert Greg Lambert

Librarian-Lawyer-Knowledge Management-Competitive Analysis-Computer Programmer…. I’ve taken the Renaissance Man approach to working in the legal industry and have found it very rewarding. My Modus Operandi is to look at unrelated items and create a process that can tie those items together. The overall…

Librarian-Lawyer-Knowledge Management-Competitive Analysis-Computer Programmer…. I’ve taken the Renaissance Man approach to working in the legal industry and have found it very rewarding. My Modus Operandi is to look at unrelated items and create a process that can tie those items together. The overall goal is to make the resulting information better than the individual parts that make it up.