Tips & Tricks
Solutions to common problems
Return on Investment: Network
Security
“Psst, your system files are showing.” Computer
and network security is gaining attention in the news due to an
ever increasing call from security firms to harden networks against
virus, trojan, and worm attacks. Many companies, however, aren’t
investing time or money into protecting themselves from these types
of attacks. The basics of keeping a network secure, such as physical
security, are often not addressed — companies don't realize that
these threats exist. According to a recent report, over $50 million
was lost last year due to insider network abuse and $215 million was
lost when networks were compromised by external threats.
“Black Hat”
hackers were once the main threat to computers, now the arrival of
multiple self-replicating and fast-spreading virus and worm programs
have made the real threat our connected computers. While many
trojans have come from email, Internet worms are spreading rapidly,
and do not require any interaction from the user. You no longer have
to open an infected email or download an infected program to become
infected. Simply being connected to the Internet without some form
of security protection can compromise your system within minutes.
These worms simply crawl through your network connection leaving
you vulnerable to data loss, information leaks, and valuable time
losses.
Data backup is another
surprisingly seldom addressed component of network security.
Companies that rely on databases, customer information, contact
lists, and confidential documents must back up this information on a
regular schedule. System failures due to hard drive crashes occur
more often than hard drive manufactures would like us to believe.
How much time would your company lose if your data was lost? The
amount of money required to install a backup solution is far less
than the ultimate cost of not having a recovery solution in
place.
California
recently passed
California SB 1386, a law that
states that a company that is the victim of data loss and security
breaches must publicly declare that they were compromised. This law
may also be passed elsewhere soon, and the potential for damage to a
company’s name is easily identified. Customers want to do business
with a company that can protect their information.
Keeping track of
employees who misuse equipment, stopping spyware and malware from
stealing personal data, and tracking unauthorized network connection
attempts can prove invaluable. The return on your investment for a
basic implementation of network security far outweighs the eventual
lost time, money, and irreconcilable damage.
There are only two
options in this digital age: preventive maintenance or disaster
recovery. For more information on securing your computers or network,
give us a call at 373-4640 or
bring your
system in for a free security evaluation and
estimate.
Understanding &
Avoiding Spyware
Are
you bombarded by pop-ups and advertisements when you start your
computer or go online? Ads ranging from “Your computer may be
recording many or all of your Internet activities” to “Speed
up your connection now!” are
everywhere. Most annoying of these ads are those that appear
before you even open your web browser. Each day brings more pop-ups
that are not only intrusive but can be offensive to many surfers.
Another equally damaging result of spyware is "data mining"
—
keeping tabs on where you go and what you look at online for the
purpose of profiling your habits — an invasion of your privacy.
These ads not only originate
from web pages that you have visited, but from downloads. Many
freeware programs and games get their revenue by pushing ads as you
use their program. Other programs claim to stop the pop-ups but
instead hijack your settings and display ads without your knowledge.
Most downloaded programs have long license agreements that few read
and fewer understand. Clicking the “I Agree” button without fully
knowing what you are agreeing to can lead to your computer being
infested with spyware and ad serving programs.
Advertisers entice you to
voluntarily install their data mining programs on your system
through a download, or by inviting you to play a mini-game or take a
small survey. The program that is installed then tracks where you go
and what you search for, and tailors ads based on your interests.
Pulling this information from your computer without your knowledge
is the equivalent of having someone sitting behind you watching
where you go online and what you shop for, then giving that
information to a telemarketer.
How do you know if you’re
running spyware programs or unknowingly giving away your browsing
habits? Do pop-up ads start filling the screen before you even open
your browser? Many websites have ads that are served to you when you
visit them, but spyware amplifies this and can lead to an
increasingly difficult surfing experience. System slowdown and
performance degradation can be symptoms of a spyware infection. For
dialup users, unauthorized connection attempts are a good sign that
a rogue program is installed.
Getting rid of these pests is a
problem almost as in depth as discovering them. There are numerous
programs that advertise their ability to remove or block spyware
from infecting your system, but some infect you with their own ad
supported files. Being careful to fully read the End User License
Agreement before installing any program, especially free programs,
helps ensure that it is safe. Resisting the temptation to 'Hit the
Monkey and Win' or 'Pick your Favorite Movie Star' can also reduce your
risk. It is necessary, no matter how careful a person is, to perform
regular system maintenance to detect and eliminate these programs.
Although some spyware can be removed through Add/Remove Programs,
others require editing your Registry or modifying other sensitive
system files.
If you suspect you have a
spyware infection, or are unable to remove a known spyware
installation yourself, your system can be safely cleaned by a
certified repair technician.
Virus
problems?
If you've recently fallen prey to the 'Teddy Bear
Virus' hoax, you may be wondering how you can tell the difference
between legitimate virus warnings received in your email, and one of
those time-consuming hoaxes.
Try
Trend-Micro's virus hoax information page before you do anything
else. They also have a
good,
free online tool for scanning your computer for viruses, if you
think you may be infected. All they ask is that you provide an email
address, and they'll send you weekly reports with the latest
information on emerging viruses, and the hoaxes too.
If you believe you are now infected with a worm or virus you are
unable to remove, give us a call at 373-4640 or
bring your system in for diagnosis and
repair. |