SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Discuss Year 2000 Issues -- Ignore unavailable to you. Want to Upgrade?


To: C.K. Houston who wrote (6061)6/19/1999 8:01:00 PM
From: C.K. Houston  Read Replies (1) | Respond to of 9818
 
Off topic ... sort of

NEW YORK (Reuters) - Computer virus and ''worm'' attacks on information systems have caused businesses to lose a total of $7.6 BILLION in the first half of 1999 as a result of disabled computers, a research firm said Friday ...

The cost of viruses and worms -- computer bugs spread by e-mail that can cause system shutdowns -- was about five times larger in the first six months of 1999 than businesses suffered during ALL of last year, said Computer Economics Inc.

The most recent study was based on 185 companies representing 900,000 international users, while the 1998 survey used slightly different methodology, researcher Michael Erbschloe said.

''The numbers probably came out low,'' he said. ''It is a conservative number in that not everyone tracks cost, and most companies tend to undercount and underreport.''

He said the $7.6 billion figure represented lost productivity and repair costs reported by the company. The 1998 figure of about $1.5 billion also included ''intrusions'' to corporate systems, in addition to general virus attacks.

Erbschloe said this year's high profile attacks by ExploreZip worm, which erased computer files and caused the shutdown of some corporate e-mail systems, and the Melissa virus, which spread quickly but did not destroy data, would only draw more attacks.

''Hackers don't like to be outdone,'' he said. ''And most companies are underfunding their security efforts.''

------------------------------------------------------------------------------

One of NIPD's [Natl Infrastructure Protection Dept] greatest concerns has been that with so many people working on Y2K remediation throughout the world (particularly on U.S. systems) ... that there would be a greater opportunity to sabotage and/or introduce viruses.

Cheryl
195 Days until ...




To: C.K. Houston who wrote (6061)6/19/1999 11:46:00 PM
From: David Eddy  Respond to of 9818
 
Cheryl -

FYI - In late '97 someone sent me an email with an attachment. When I opened it up, the first thing that I saw was DOD logo. It was one of their first drafts on addressing Y2K.

In their defense (only slightly tongue-in-cheek), I spoke at a public DPMA (Data Processing Management Association) Y2K seminar in Alexandria, VA in December 1996. Given that the venue was about 10 minutes away from the PuzzlePalace, the audience was heavily DoD & govt. There were two presentations from DoD and Navy Y2K project managers (and probably some others, but this stuff tends to blurr with time).

The DoD was already on their second round of project managers. The DoD lead was history by the time I saw her at the next Horn hearing in March(?) '97. It was real clear even then that Y2K was a hot potato that one didn't want to hold for very long.

And it was a glorious PowerPoint presentation... entirely content free, but I was ready to fix my bayonet & charge up that hill & take that machine gun nest with my bare teeth.

- David