The DataGuard Data Protection Newsletter
July/August, 2005

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • Puddle Phishing

    Many large banks are all too familiar with the problem of phishing: customers receive an email, as if from the bank, asking for logons and passwords and other personal information. The financial services sector typically accounts for four out of every five phishing attacks. But no matter how many times banks tell customers to take no notice of emails purporting to come from the bank, the scam continues to fool the unwary.

    Phishing scams are increasingly being directed at smaller, more targeted firms, including local banks and credit unions. Websense, a provider of employee Internet management solutions, has coined the term puddle phishing to describe this latest security development. The company warns that the customers of small financial institutions are being targeted.

    Websense monitors 50 million URLs per day, searching for Web sites infected with malicious code, such as spyware and phishing dummies. Earlier this year, it reported that more than 13,000 infected sites were discovered in the first quarter of 2005 alone. They have seen a growing number of small credit unions falling foul of this latest development: more than 30 since the beginning of the year. Dan Hubbard, senior director of security and technology research at Websense, reports that one of the community banks recently under attack operates only 11 branches. Researchers also noted that a credit union that serves employees and staff of the White House was also hit with a phishing scam.

    Customers and users still need education about e-mail scams The concern is that puddle phishing, presumably, works. "The fact that we are seeing more and more of the smaller financial outlets being targeted by phishing attacks may indicate that this is a highly profitable scam," continues Hubbard.

    Top

  • What Is A Firewall?

    A firewall is either hardware or software that stands between your computer and its Internet connection, and provides "access control." Access control is just a fancy way of saying that your firewall determines what can and cannot pass through.

    A computer firewall is very much like the firewall in your car. Your car's firewall keeps the bad stuff from your engine [like heat and exhaust] out of your passenger cabin. But it isn't impervious. It has holes in it to let the good stuff [like the steering column and the brakes] through.

    A good computer firewall, like your car's firewall, keeps the bad stuff out and lets the good stuff through. How?

    1. Computer stealth: they hide your computer from the crackers' scans; and
    2. Intrusion blocking: they make it harder [but not impossible] for crackers to break in.

    Top

  • Four Security Oversights

    All computer security measures are aimed at one thing — keeping intruders away from private information. Here are the five worst security practices found in businesses both large and small:

    1. Failing to enforce policies. If your organization wants good security practices, it must establish a clearly enunciated set of policies. Among other things, these policies must define basic usage rules, such as never opening strange emails, surfing random sites on personal business, or downloading files from the Web.
    2. Ignoring new vulnerabilities. Basically, many security managers are not keeping up with avaialble patches.
    3. Relying too much on technology. Another big mistake is relying excessively on technological fixes and paying too little attention to actually using them. For example, if you tell upper management that you've installed the latest firewall or the top antivirus software, they'll think you've done your job. But unless you've carefully configured that firewall and maintained the antivirus software, you really haven't done much of anything.
    4. Failing to thoroughly investigate job candidates. The fourth biggest mistake is failing to properly screen job candidates for criminal records or even poor financial decisions, especially for candidates outside of the IT department.

    Top

  • Don't Forget to Protect Limited Critical Systems

    Organizations often have plans in place that detail what must be done if a catastrophic event takes out their entire data center or makes it inaccessible. However they frequently fail to prepare for the loss of one critical system. For example, there is no plan in place that describes what to do if the firm's Internet connection goes down or if a single file server fails.

    These types of outages can be protected against using some sort of "high availability" solution. In the case of the Internet connection, a redundant connection from a different provider can be obtained and automatic failover can be accomplished in the event the primary line goes down. Having a spare server available or, at a minimum, critical spare parts, might be an adequate solution for a file server outage. Of course, the solution you choose depends on your tolerance for downtime. The longer you can tolerate a critical component being out of commission, the less expensive the high availability solution will have to be, as a general rule.

    The point is, when you write your Business Continuity Plans, you should not just plan for catastrophic events like 9/11. You should give some thought to smaller "disasters" that might only effect one or two components of your IT infrastructure.

    Top

  • Protect Yourself From Phishers

    http://netsecurity.about.com/od/secureyouremail/a/aa061404_2.htm

    Top


File-Sharing Risks

Internet file-sharing technology is a popular way for users to exchange, or "share," files stored on their computers. Peer-to-peer (P2P) applications (commonly used to share music files) are the most common forms of file-sharing technology.

Unfortunately, this technology can make your systems susceptible to risks such as virus/scumware infection, attack, or exposure of personal information.

Risks introduced by file-sharing technology include:

  1. Malicious programs. It is almost impossible to verify that the source of shared files is trustworthy. File sharing applications are often used by attackers to transmit spyware, viruses, Trojan horses, or worms.
  2. Exposure of sensitive information. By using P2P applications, you may be giving other users access to personal information. Whether it's because certain directories are accessible or because you provide personal information to what you believe to be a trusted person or organization, unauthorized people may be able to access sensitive information.
  3. Susceptibility to attack. Some P2P applications may ask you to open certain ports on your firewall to transmit the files. This may give attackers access to your computer or enable them to attack your computer by taking advantage of any vulnerabilities that may exist in the P2P application.
  4. Denial of service. Downloading files causes a significant amount of traffic on your network and may tie up the PC's CPU. This may reduce the availability of certain programs or may limit your access to the Internet.
  5. Legal issues. Files shared through P2P applications may include pirated software, copyrighted material, or pornography. If you download these, even unknowingly, you may be faced with fines or other legal action. If your computer is on a company network and exposes customer information, both you and your company may be liable.

I can think of no good business reason to allow people to use these applications on a corporate network.

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving