• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Business Survey Says Cyber Crime Overtakes Physical Crime

    March 20, 2006 Timothy Prickett Morgan

    According to a global survey of over 3,000 IT managers spanning all industries and company sizes commissioned by IBM, cybercrime is becoming more of a big deal for big business than real–what IBM calls physical–crime.

    To publicize the study, IBM released some of the findings among the 600 IT managers who were surveyed in the United States in last January and December. About 60 percent of those polled believe that the cost of lost revenues, loss of current and potential customers, and loss of employee productivity that are the result of hacking, denial of service, and other cybercrimes now exceeds losses from physical crimes like stealing and embezzling.

    Some 84 percent of the executives polled said that they believe cybercrime has moved on from an initial phase where lone or small groups of hackers broke into systems or created malware to a more organized crime structure like that of the underworld we know from television and movies. And 74 percent of those polled on the United States say that the threats to corporate security come from inside–not outside–the organization. The IT managers polled say they want local and federal law enforcement agencies to help them combat this crime, much as they would any other kind.

    “U.S. IT executives are making it very clear how seriously they take cybercrime threat, both from internal and external sources,” explains Stuart McIrvine, director of IBM’s security strategy. “Paralleling their growing awareness of the impact of cybercrime on their business is the view that this is not a battle they can fight wholly on their own. The nature of crime is changing, and businesses, technology providers and law enforcement must work together to ensure the right safeguards are being put in place to securely operate in today’s environment.”

    So what are businesses doing? Upgrading their antivirus and firewall software, for one. Two-thirds of those polled have implemented or are in the process of implementing intrusion detection systems, and half are putting in place automated vulnerability screening and software patch management systems.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 12 -- March 20, 2006

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Network Technology Acquires Twinax, Token Ring Assets from NLynx, Madge Big Blue Lets Big Partners Collaborate with IBM Research

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 12

This Issue Sponsored By

    Table of Contents

    • Business Survey Says Cyber Crime Overtakes Physical Crime
    • Azul Systems Sues Sun Over Java Licensing
    • AttachmateWRQ Expands Market Reach and SOA Technologies
    • Seagull Bolsters SOA Strategy with an Acquisition and a Partnership
    • Big Blue Lets Big Partners Collaborate with IBM Research
    • Business Survey Says Cyber Crime Overtakes Physical Crime
    • Network Technology Acquires Twinax, Token Ring Assets from NLynx, Madge
    • COMMON’s Curriculum Is OK; It’s IBM that Needs to Change
    • Microsoft to Lure Competing Business Partners to Windows
    • Second-Hand iSeries Boxes Are Pretty Cheap

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Brace Yourself: Another Power Systems Price Hike Coming May 1
    • Updates Announced for IBM i BRMS And SMTP Email Client
    • AI Will Be Front And Center At POWERUp 2026 Next Week
    • IBM i PTF Guide, Volume 28, Number 16
    • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
    • You Are Much More Than Power Systems, And So Are We
    • Startup Seeks The “Golden Path” for IBM i Modernization
    • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
    • IBM i PTF Guide, Volume 28, Number 15
    • Bob 1.0 Users Bugged By Lack Of One Feature

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle