The 13 Scariest Things in IT for 2010

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Previous The 13 Scariest Things in IT for 2010-1 Next

Click through for 13 of the biggest scares in IT for 2010.

Halloween may not seem all that scary to IT people -- when you are terrified all year long, what are a few goblins, witches and monsters to worry about?

This year’s list of the 13 scariest things about enterprise IT is worth noting to see what’s new and what has become even scarier.

For instance, just when we thought we were getting relatively used to general insecurity related to all things IT, along comes a potential Stuxnet malware nightmare. Nobody seems to know for sure where it came from, but the idea that malware can take over physical machinery at a nuclear power plant, or anywhere else, for that matter, is downright scary.

Relatively new threats on the list this year include IT automation, self-service IT and public cloud computing infrastructure, all of which represent new ways of managing IT. While each of these trends brings a certain amount of efficiency, to one degree or another they can be career-threatening.

And finally, the rise of the Apple iPad and Google Android in the enterprise brings a host of management issues that in addition to upending the dominance of Windows mean that IT support is about to get a lot more difficult.

Then, of course, we have our perennial IT ghouls, which include compliance auditors, virtualization, smartphones, vendor consolidation, social networks, USB drives, botnets and the biggest specter of them all: outsourcing.

Given all these fears, it’s a wonder anybody in IT gets any sleep at night. Here’s hoping that by this time next year, the economy will have recovered and we can all rest a little easier.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.