The DataGuard Data Protection Newsletter
September, 2004

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

A recent survey by the META Group revealed that 80% of executives view email as their preferred method of communication. I don't know about you but I found this surprising. Somehow I thought the telephone would still be their preferred way of communicating.

What does this mean?

Well, for one thing, it means we all better have another look at how we are protecting our email.

  • How many of you that are not using Microsoft Exchange are backing up your local hard drive? (That's where your email is most likely stored after you download it.)
  • How many of you have redundant Internet connections to insure that you can still send/receive mail if there is a disruption in service from one of your Internet Service Providers (ISP's)?
  • How many of you realize that the vast majority of email messages are not sent securely across the Internet?
  • How many of you have acceptable use policies in place for email usage? (Or for web and Instant Messaging use, for that matter?)
Food for thought.

Joe Tartaglia / High Caliber Solutions

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • Microsoft to Enter Data Protection Market

    Microsoft Corp is entering the disk-based backup and recovery industry with its Data Protection Server (DPS), a continuous, disk-based backup and recovery solution.

    DPS is designed to provide robust data protection for the Windows Server System family, reducing complexity and improving operational efficiency for Windows customers, officials said.

    Microsoft said its customers have found backing up and recovering their data to be labor intensive and complex.

    "It's been one of our major objectives in the Windows server division for some time [to enter the backup and recovery market]," said Rakesh Narasimhan, general manager, Windows server division, for Microsoft in Redmond, Wash. "The feedback we've been getting from our customers is there's still a lack of data protection that's easy to manage, and an affordable storage solution on the Windows platform."

    "There are certain (storage and data recovery) features people are used to on high-end systems, we're trying to bring that same functionality to the masses at an affordable price point," he said. "This gives small- and medium-sized businesses the opportunity to really leverage Microsoft's and its' partners' solutions."

    DPS provides three specific capabilities:

    1. Rapid and reliable recovery through use of disk-based backup allows IT administrators and end users to recover data in minutes instead of hours;
    2. Continuous, efficient protection allows data to be backed up without impacting IT infrastructure;
    3. Integration with tape through a backup interface under development that is based on the Volume Shadow Copy Service (VSS) API included in Windows Server 2003 will allow tape backup partners to address customer needs for backup and recovery in Windows-based environments.

    "The use of disk as a data-protection medium delivers significant improvements in recovery time and recovery-point objectives, and makes possible a continuum of data recovery options spanning backup and replication," said Alex Gorbansky, senior analyst at the Taneja Group in Hopkinton, Mass.

    Currently available in a private beta version, Data Protection Server is scheduled to be generally available in the second half of 2005.

    Top

  • Instead of Passwords, Passphrases

    Using longer passwords makes it extremely difficult for crackers to defeat the weakest link in your security systems - the password.

    So, instead of using single words as passwords, why not consider using an easy-to-remember phrase instead? Here are some examples:

    • Lucy In The Sky With Diamonds
    • My birthday is October 1
    • Give me liberty or give me death!

    Passwords longer than 14 characters are extremely difficult to crack. Using phrases at least this long makes it easier to remember longer passwords.

    Top

  • Security Improvements in Windows XP Service Pack 2

    Windows XP Service Pack 2 is a major operating system update that contains a number of new security updates and features. Here is a summary of the new security updates and features in Service Pack 2:

    1. Windows Firewall

      Windows Firewall helps to protect you from worms and other malicious code that spread via the Internet.

    2. Internet Explorer Local Machine Zone Lockdown

      New settings for Internet Explorer disable the execution of ActiveX controls and Active scripting in the Local Machine Zone. This protects you from attacks and vulnerabilties such as Download.Ject.

    3. Additional Internet Explorer Security Changes

      Internet Explorer now includes a pop-up blocker, additional window restrictions, and changes in MIME type handling that better defend against social engineering and "phishing" attacks.

    4. Email Handling Technologies

      Outlook Express now supports the ability to read and compose messages in plain text and to block external HTML content such as "web bugs." Security checks are now performed in a more consistent way to help prevent the execution of malicious attachments.

    5. Security Center

      The Security Center "...provides a central location for changing security settings, learning more about security, and ensuring that [your] computer is up to date, with the essential security settings that are recommended by Microsoft."

    6. Automatic Updates

      The update services and automatic update feature of Windows XP have been improved.

    7. Data Execution Prevention

      Memory protection helps prevent attackers from executing code on your computer.

    Top

  • Understanding Denial of Service (DoS) Attacks

    What is a denial-of-service (DoS) attack?

    In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.

    The most common type of DoS attack occurs when an attacker "floods" a network with information. A server can only process a certain number of requests at once, so if an attacker overloads it with requests, it can't process your request.

    An attacker can use spam to launch a similar attack on your email account. Email accounts are assigned a specific amount of disk space (quota) which limits the amount of data you can have in your box at any given time. By sending many, or large, email messages to the account (mail bombing), an attacker can consume your quota, preventing you from receiving legitimate messages.

    What is a distributed denial-of-service (DDoS) attack?

    In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a web site or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers to launch the denial-of-service attack.

    How do you avoid being attacked?

    Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the probability that an attacker will use your computer to attack others:

    1. Install and maintain anti-virus software
    2. Install a firewall, and configure it to restrict traffic coming into and leaving your computer
    3. Follow good security practices for distributing your email address. Using an email filtering service will help manage unwanted traffic.

    How do you know if an attack is happening?

    Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate an attack:

    • Unusually slow network performance (opening files or accessing web sites)
    • Unavailability of a particular web site
    • Inability to access any web site
    • Dramatic increase in the amount of spam you receive in your account

    Top

  • Securing Your Home PC

    Some experts estimate that 50% of all home computers have been compromised with viruses, scumware, adware, etc. Dell has some great information oh how to tighten up security on your home computer:

    http://www1.us.dell.com/content/topics/segtopic.aspx/security?c=us&cs=19&l=en&s=dhs

    Top


Cost-Justifying Data Protection Investments

Key decision makers in an organization often look at data protection systems as nothing more than an expensive insurance policy that the organization hopes never to use. Overcoming this objection can require some in-depth explanations on your part to the powers-that-be. To help strengthen your case, you should also consider creating a data protection plan that acts as more than just insurance.

In addition to discussing exactly how much money the company could lose to a serious outage, you can also point out that lower recovery costs will offset the expenses of the DP system--and a DP system can even lower operational costs due to avoiding fines from regulatory agencies.

You should also consider designing your proposed DP solution to serve other purposes in addition to protecting the data systems. While there are several ways to do this, the two most common are centralized or enhanced backup systems and multitasking the DP servers.

Enhanced backup involves using a replication system to transport data to another physical device, using either software-based tools or SAN-based hardware replication systems. In either case, you can typically back up the replicated data systems from the replicated copy, freeing up the production systems.

This means you don't have to worry about the production systems taking a processor and/or memory hit when the backup is running. In addition, you can reduce the number of open file issues you'd normally see with standard backup technologies.

All this translates into more manageable backups and a longer "backup window." Using an enhanced backup system, you can back up data in the middle of the production day without impacting end-user performance or requiring all files to be in a closed state.

A centralized backup system extends this concept to branch-office operations. The system replicates data to a central or set of regional offices, where you can back it up and protect it. Because branch offices often don't have dedicated technical staff, this offers the added benefit of performing backup operations where the knowledgeable staffers are.

Multitasking the backup servers involves using the DP systems to perform other operations while still being ready to stand in for a failed primary data system. For example, two file servers can easily replicate or otherwise copy data to each other. Under normal circumstances, these servers act as single file resources. But during a disaster, either one can stand in for its counterpart--while continuing to serve its original population.

Keep in mind that you'll experience a performance hit after a failover when using this solution. But if this hit is acceptable, multitasking the backup server is a valid methodology for getting more than just insurance out of your DP plan.

However you decide to make the most out of your DP system, planning to do so before asking for budget approval can often make the process go much more smoothly. Demonstrating that your proposed plan offers value beyond insurance can help you overcome budget hurdles--and get the company more "bang for its buck."

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving