SHARE
Facebook X Pinterest WhatsApp

Desktop Search Demystified

Jan 5, 2005

There’s been a lot of talk lately over new desktop search tools and the risk they pose to the enterprise. The worry is that while these nifty little apps—such as Google Desktop Search and a host of other similar programs—can help you find that long-lost e-mail or proposal draft you’ve been searching for, they can also reveal data you might not want discovered, such as confidential memos or personal files. The search engine will locally cache content viewed by a PC, which can be accessed by another user of the same PC, or even by Internet hackers who gain electronic access to the PC. Because of this, some analysts warn companies to restrict these programs from being installed, especially if the computers are shared among different employees.

But the security threat is not caused by the search tools themselves—which have been downloaded by the thousands, often under the radar of the CIO. In fact, desktop search tools do not cause any security vulnerabilities whatsoever, says security expert Bruce Schneier, founder and CTO of Counterpane Internet Security Inc. Rather, “They tell you about vulnerabilities you already have,” he says. “Desktop search programs don’t magically make files findable. All they’re doing is searching, which is exactly what they’re supposed to do.”

Recommended for you...

What do Amazon, Microsoft, Meta, and IBM Have in Common? Tape Storage
Drew Robb
Aug 15, 2022
What Does Quantum Computing Mean for IT?
Devin Partida
Aug 11, 2022
Solving the Video Surveillance Retention Challenge 
Drew Robb
Jul 28, 2022
Top 6 IT Challenges in Healthcare
Lauren Hansen
Jun 21, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.