The DataGuard Data Protection Newsletter
June, 2005

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • Deleting Files Permanently

    Before getting rid of an old computer or data storage device, you should make sure that data stored on it has been properly deleted. This is especially true if you stored banking or credit card information, tax returns, payroll information and other sensitive information on the device. The question is, what is the best way to make sure this data cannot be accessed after the device leaves your possession.

    Reformatting a hard drive is not guaranteed to render data inaccessible. Probably the best way to insure that nobody can access the data is to physically destroy the device or media. Unfortunately, this can often be too time consuming or undesirable.

    The next best option is to look into software and hardware devices that claim to erase hard drives and/or CD's. These programs and devices have varying levels of effectiveness. When choosing a software program to perform this task, make sure data is overwritten multiple times (3-7 times is preferable). The software should also use random data to overwrite your data because this makes it harder for attackers to determine the pattern and discover the original information underneath. It should also use all zeros to overlay existing data in the final pass.

    Top

  • Who is Doing the Hacking?

    An 'insider threat' survey by the US Secret Service and Carnegie Mellon University finds that 82 percent of people who hack into their own company's systems 'exhibited unusual behavior in the workplace prior to carrying out their activities.'

    'Almost all - 96 percent - of the insiders were men, and 30 percent of them had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-financial-fraud related theft offenses (11 percent).' It goes on to say that 86 percent held technical positions at the companies: '...if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers.'

    Top

  • Testing Your Firewall

    The best way is to make sure your firewall is working is to have a trusted firm (usually referred to as "white hat hackers") do it for you. Of course, these firms charge for their services and they are not cheap. If you are on a tight budget, you can test your firewall yourself for free with Sygate Online Services.

    Sygate Online Services (http://scan.sygate.com/ is a free web site that, with your permission, can probe your firewall looking for vulnerabilities. Sygate Online Services can scan computers running almost any operating system.

    Top

  • Browse Safely

    Active content and cookies are commonly used in web sites and may pose hidden threats when sites using them are viewed in a browser.

    Active Content

    To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be used to create "splash pages" or options like drop-down menus. Unfortunately, these scripts are often a way for attackers to download or execute malicious code on a user's computer. Examples of active content are JavaScript, VBScript, and Java and ActiveX controls. Keep in mind that many email programs use the same software as web browsers to display HTML, so vulnerabilities that affect active content like JavaScript and ActiveX often apply to email. Viewing messages as plain text may resolve this problem.

    Cookies

    When you browse the Internet, information about your computer may be collected and stored. This information might be general information about your computer (such as IP address, the domain you used to connect, and the type of browser you used). It might also be more specific information about your browsing habits (such as the last time you visited a particular web site or your personal preferences for viewing that site).

    To increase your level of security, consider adjusting your privacy and security settings to block or limit cookies in your web browser. To make sure that other sites are not collecting personal information about you without your knowledge, choose to only allow cookies for the web site you are visiting; block or limit cookies from a third-party. If you are using a public computer, you should make sure that cookies are disabled to prevent other people from accessing or using your personal information.

    Top

  • Dealing With Inappropriate IM Usage

    Here are some recommendations on how to address inappropriate use of Instant Messaging (IM) from a management perspective:

    1. Establish a company-wide acceptable use policy We believe this should be done for the computers in general, email usage, and IM usage.
    2. Notify all employees of these policies and clearly spell out consequences if they are not adhered to.
    3. Obtain employee sign-off on these policies.
    4. Implement measures that would severely restrict the use of IM and (if you feel it is necessary) monitor inappropriate use of email.

    Top


Recovering from Viruses

If a computer gets infected with malicious virus, Trojan, worm, keylogger, adware, etc., here are some things you can do to get back up and running:

Minimize the Damage

  1. Update your virus and scumware deffinitions for the software you use.

  2. Disconnect your computer from the Internet and your network. This will stop your computer from infecting others on the network and stop it from communicating information to some "home base" out on the Internet. It will also make it impossible for a remote user to access your hard drive.

  3. Perform a manual virus and scumware scan of your entire system. If the software can't locate and remove the infection, you may need to reinstall your operating system. Note that this will usually delete all of your files and any additional software that you have installed on your computer.

Prevent Future Infections

  1. Use and maintain anti-virus and anti-scumware software. It is important to keep this software current.
  2. Change your passwords regularly. Your original passwords may have been compromised during the infection. This includes passwords for web sites that may have been cached in your browser.
  3. Keep operating system and application software up to date. Install all available patches as soon as they become available.
  4. Install a firewall.
  5. Follow good security practices - Be very careful when opening email attachments, stay clear of porn web sites, etc.

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving