Gartner: Business Spends 60% of IT Budget on Infrastructure
A new Gartner study finds that small and midsized organizations
(under $1 billion in revenue) are spending 53 percent to 60 percent
of their total information technology (IT) budget on infrastructure,
including data center, voice and data networks, desktop and help
desk, according to Gartner Consulting's Worldwide IT Benchmark
Service. For organizations over $1 billion in revenue, the average
spent on IT infrastructure is just under 50 percent.
"For many small and medium sized businesses, particularly those
that compete in highly competitive marketplaces, IT can be a key
component of competitive strategy," said Howard Rubin, an associate
with Gartner Consulting. "However, in more mature markets, some
small organizations still treat IT as just another cost of doing
business. Those organizations continue to focus on keeping IT
For companies with less than $1 billion in revenue, media companies
and IT firms were among the leaders in terms of IT spending as a
percentage of revenue in the 2005 rankings, at 8.16 percent and
6.85 percent, respectively (see Table). Banking and financial
services organizations typically spend at the highest rates, but
they ranked sixth and fourth, respectively, in the 2005 results.
Energy and consumer products organizations under $1 billion in
revenue are among the lowest spenders on average.
Company Segment Percentage of Revenue Spent on IT:
Professional Services: 6.9%
Information Technology: 6.9%
Financial Services: 5.9%
Health Care: 4.6%
Construction & Engineering: 4.4%
Cross Industry: 4.5%
If You Need To Write An Antispyware RFP
In the event you need a series of questions to write an RFP when
choosing an anti-spyware solution - these questions from eWeek
are a good starting point. They start their list with:
"Enterprise-class anti-spyware systems are an emerging and rapidly
evolving product class. Solutions fall into three main categories
at this time: dedicated anti-spyware systems, defenses integrated
into anti-virus applications and gateway defenses for HTTP and
other protocols. eWEEK Labs has put together a series of questions
to help administrators begin developing an RFP (request for proposal)
and gauge the severity and source of spyware infections throughout
the enterprise." Here is the list:
SQL Server Marketing presents 'Escape from Yesterworld'
The US marketing people for the Visual Studio and SQL Server
product teams are pleased to announce the "Escape from Yesterworld"
site has launched. In their own words: "Through the fun and
interesting links below, people can learn about the benefits
of Visual Studio 2005 and SQL Server 2005 in a humorous way.
The website is admittedly pretty snazzy.
8 Steps To Prevent Malware Outbreaks
Remember that it's impossible to prevent a type of malware
attack that's never occurred. However, if you focus on putting
the following security measures in place now, you'll be your
organization's saving grace the next time your Windows-based
network is attacked in this way.
1. Document your action steps
Use an incident response plan. Such a plan doesn't have to be
that fancy, especially when you're getting started. At least
document steps for detection, investigation, containment,
eradication and recovery. A great place to start with such a
plan is NIST's Computer Security Incident Handling Guide.
You can find the rest of this article with steps 2 through 8
at the SearchWinSecurity Site:
Hacker For Hire...WOW
"Tell me the things you most want to keep secret," Mr. Seiden
challenged a top executive at the bank a few years back. The
executive listed two. One involved the true identities of
clients negotiating deals so hush-hush that even people inside
the bank referred to them by using a code name. The other was
the financial details of those mergers and acquisitions.
A week later, Mr. Seiden again sat in this man's office in
Manhattan, in possession of both supposedly guarded secrets.
As a bonus, he also had in hand a pilfered batch of keys that
would give him entry into this company's offices scattered
around the globe, photocopies of the floor plans for each
office and a suitcase stuffed with backup tapes that would
have allowed him to replicate all the files on the bank's
computer system. MP3 interview also available, here.
Anti-Phishing Working Group Quote
"The APWG's belief is that conventional phishing via social
engineering schemes will be eclipsed by advanced, automated
crimeware based on keyloggers, redirectors and session hijacking
technologies" Quote by Anti-Phishing Working Group Chairman