The challenges facing IT professionals in today's market
are formidable. Heightened security concerns and looming
Y2K issues top the list.
Complex Countdown
The challenges facing IT professionals in today's market
are formidable. Heightened security concerns and looming
Y2K issues top the list.
- By Linda Briggs
- 02/01/1999
At least two of the topics covered in this issue indicate
the scope and complexity of the challenges facing many
of you in the coming year.
First is our series of stories on the Year 2000 challenge.
I assume youve read more than enough in the computer
press and elsewhere about that pending crisis (coverage
predicted by our own Em
C. Pea in last issues column). The Y2K approach
were taking in this issue provides you with a series
of articles that offers some truly hands-on information
about how your peers are dealing with the rollover to
a new millenium.
Our Y2K stories are written by people like you: Microsoft
Certified Professionals in the field. These authors arent
professional writerstheyre professional network
administrators, systems engineers, consultants, and IT
group leaders. Like you, theyve had to look beyond
the hype to explain Y2K issues coherently to management,
help draw up a compliance plan, figure out where to allocate
limited resources, run system-wide audits, decide what
to fix, what to replace, and what to ignore, and help
educate users about it all. Like many of you, theyve
rolled up their sleeves and are dealing with Y2K right
down to the individual desktop and BIOS level. Their stories,
which we hope will inspire and educate you in your own
Y2K efforts (youll find them under the Features
section of this issue's table of contents).
The second indicator of the kind of tough challenges
you face daily is Roberta Braggs new column, Security
Advisor. This
month, in her second column, Roberta discusses how
to conduct an internal security audit. The columns
capper is Robertas 107-question security checklist
to help you evaluate just how well your company defends
its fort. Simply reading through her list is enough to
whip up some big appreciation for those responsible for
security in a widespread network.
Here are just some examples of the scope of the security
challenge: Has someone at your company taught users what
a secure password is, and where not to store it? On another
level altogether, does someone make sure doors to the
outside world are secured when they should be so that
property cant disappear? Do you have a proxy server
in place for Internet connections? What about a sniffer?
Have you checked to make sure the server screen cant
be read from outside the room? Who has the keys to the
server room? Did you get them back from that employee
who left a few months ago? Has someone created an ERD
for every server? Where are they? And on and on. If the
network you manage rates anywhere near a perfect score,
send Roberta and me mail, would you?
Whats the biggest daily trial you face in the trenches
of IT? Send me mail at [email protected]maybe
we can turn it into a future cover story.
About the Author
Linda Briggs is the founding editor of MCP Magazine and the former senior editorial director of 101communications. In between world travels, she's a freelance technology writer based in San Diego, Calif.