The Wayback Machine - https://web.archive.org/all/20060709190041/http://www.itsalaska.com:80/support/support_tips.htm
ITS Alaska Home
ITS Alaska Computer Services - Mat-Su Valley Alaska
I T S Alaska Support
 
 
COMPUTER SERVICES
 
Viruses & Worms
 WEB DEVELOPMENT
 
Domain Transfers
 
Choosing a Name
 WEB HOSTING
 
DNS Info
 
Search Engines
 TIPS & TRICKS
  
Virus Problems?
   Spyware

  
Network Security
I T S Computer Services Support Mat-Su Valley Alaska
I T S Alaska Support

Tips & Tricks
Solutions to common problems

Return on Investment: Network Security

“Psst, your system files are showing.” Computer and network security is gaining attention in the news due to an ever increasing call from security firms to harden networks against virus, trojan, and worm attacks. Many companies, however, aren’t investing time or money into protecting themselves from these types of attacks. The basics of keeping a network secure, such as physical security, are often not addressed — companies don't realize that these threats exist. According to a recent report, over $50 million was lost last year due to insider network abuse and $215 million was lost when networks were compromised by external threats.

“Black Hat” hackers were once the main threat to computers, now the arrival of multiple self-replicating and fast-spreading virus and worm programs have made the real threat our connected computers. While many trojans have come from email, Internet worms are spreading rapidly, and do not require any interaction from the user. You no longer have to open an infected email or download an infected program to become infected. Simply being connected to the Internet without some form of security protection can compromise your system within minutes. These worms simply crawl through your network connection leaving you vulnerable to data loss, information leaks, and valuable time losses.

Data backup is another surprisingly seldom addressed component of network security. Companies that rely on databases, customer information, contact lists, and confidential documents must back up this information on a regular schedule. System failures due to hard drive crashes occur more often than hard drive manufactures would like us to believe. How much time would your company lose if your data was lost? The amount of money required to install a backup solution is far less than the ultimate cost of not having a recovery solution in place.

California recently passed California SB 1386, a law that states that a company that is the victim of data loss and security breaches must publicly declare that they were compromised. This law may also be passed elsewhere soon, and the potential for damage to a company’s name is easily identified. Customers want to do business with a company that can protect their information.

Keeping track of employees who misuse equipment, stopping spyware and malware from stealing personal data, and tracking unauthorized network connection attempts can prove invaluable. The return on your investment for a basic implementation of network security far outweighs the eventual lost time, money, and irreconcilable damage.

There are only two options in this digital age: preventive maintenance or disaster recovery. For more information on securing your computers or network, give us a call at 373-4640 or bring your system in for a free security evaluation and estimate.

Understanding & Avoiding Spyware

Are you bombarded by pop-ups and advertisements when you start your computer or go online? Ads ranging from “Your computer may be recording many or all of your Internet activities” to “Speed up your connection now!” are everywhere. Most annoying of these ads are those that appear before you even open your web browser. Each day brings more pop-ups that are not only intrusive but can be offensive to many surfers. Another equally damaging result of spyware is "data mining" — keeping tabs on where you go and what you look at online for the purpose of profiling your habits — an invasion of your privacy.

These ads not only originate from web pages that you have visited, but from downloads. Many freeware programs and games get their revenue by pushing ads as you use their program. Other programs claim to stop the pop-ups but instead hijack your settings and display ads without your knowledge. Most downloaded programs have long license agreements that few read and fewer understand. Clicking the “I Agree” button without fully knowing what you are agreeing to can lead to your computer being infested with spyware and ad serving programs.

Advertisers entice you to voluntarily install their data mining programs on your system through a download, or by inviting you to play a mini-game or take a small survey. The program that is installed then tracks where you go and what you search for, and tailors ads based on your interests. Pulling this information from your computer without your knowledge is the equivalent of having someone sitting behind you watching where you go online and what you shop for, then giving that information to a telemarketer.

How do you know if you’re running spyware programs or unknowingly giving away your browsing habits? Do pop-up ads start filling the screen before you even open your browser? Many websites have ads that are served to you when you visit them, but spyware amplifies this and can lead to an increasingly difficult surfing experience. System slowdown and performance degradation can be symptoms of a spyware infection. For dialup users, unauthorized connection attempts are a good sign that a rogue program is installed.

Getting rid of these pests is a problem almost as in depth as discovering them. There are numerous programs that advertise their ability to remove or block spyware from infecting your system, but some infect you with their own ad supported files. Being careful to fully read the End User License Agreement before installing any program, especially free programs, helps ensure that it is safe. Resisting the temptation to 'Hit the Monkey and Win' or 'Pick your Favorite Movie Star' can also reduce your risk. It is necessary, no matter how careful a person is, to perform regular system maintenance to detect and eliminate these programs. Although some spyware can be removed through Add/Remove Programs, others require editing your Registry or modifying other sensitive system files.

If you suspect you have a spyware infection, or are unable to remove a known spyware installation yourself, your system can be safely cleaned by a certified repair technician.

Virus problems?

If you've recently fallen prey to the 'Teddy Bear Virus' hoax, you may be wondering how you can tell the difference between legitimate virus warnings received in your email, and one of those time-consuming hoaxes.

Try Trend-Micro's virus hoax information page before you do anything else. They also have a good, free online tool for scanning your computer for viruses, if you think you may be infected. All they ask is that you provide an email address, and they'll send you weekly reports with the latest information on emerging viruses, and the hoaxes too.

If you believe you are now infected with a worm or virus you are unable to remove, give us a call at 373-4640 or bring your system in for diagnosis and repair.






 
COMPUTER SERVICES | WEB DEVELOPMENT | WEB HOSTING

NEWS | SERVICES | CLIENT LIST | TIPS & TRICKS | ABOUT US

Copyright ©2003-2004 ITS Alaska. All rights reserved. Privacy Statement & Terms of Use.