The DataGuard Data Protection Newsletter
October, 2005

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • How Far Away Should Your DR Site Be?

    Numerous factors should be taken into account when deciding what the distance should be between your primary site and your data recovery site:

    • Threats and probabilities. The selection of an alternate location should be based on the type of threats your organization could be exposed to. For instance, if fire presents the highest risk, a remote site across a campus may be fine. Conversely, an increased risk of a widespread disaster, such as a hurricane, will dictate much greater distances between sites. Statistical data can provide guidance in establishing the probability of occurrence.
    • Risk tolerance. Potential risks can also include widespread power grid failure (2003 blackout), wide-area weather phenomenon (Katrina), etc. An organization must assess risk based on existing threats and vulnerabilities measured against probabilities. Because risk can be mitigated but rarely completely avoided, a decision must be made as to what represents a risk that is tolerable to the business.
    • Potential losses vs. cost of resilience. This is probably the most important factor to consider. The cost of establishing and maintaining a remote site should never exceed the potential losses incurred if you didn't have that remote site.
    • Recovery Time Objective (RTO). The RTO will dictate whether a remote or alternate recovery site is required for a specific service. An RTO will also help determine whether failover to a replicated environment (hot site) is required or space to accommodate recovery is sufficient (cold site).
    • Remote site accessibility. Serious consideration must be given to the way applications and data at the remote site will be accessed by business units and end users. Lack of network bandwidth or accessibility may render the remote storage equipment useless.

    Top

  • What Can Be Learned From Katrina?

    http://www.continuitycentral.com/feature0245.htm

    Top

  • Did You Know?

    Some disturbing facts:

    • Worms and viruses hit a record level in January 2003, numbering close to 20,000 and causing more than $8 billion in damage worldwide.
    • In a recent crime survey, 85 percent of respondents had experienced computer viruses, 70 percent had some form of Web site vandalism, and 12 percent had some form of theft of transaction information .
    • Forty-one percent of Fortune 100 firms see spending money on business continuity management as a priority to ensure compliance with government regulations.

    Top

  • Keeping Kids Safe Online

    Children present unique security risks when they use a computer -- not only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can dramatically reduce the threats.

    When a child is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. You need to consider these characteristics when determining how to protect your data and the child.

    It is easy to think that just because your child is typing up an essay or doing some basic research online, there is no danger. But what if, when saving a document, the child deletes a program file? Or what if they unintentionally visit a malicious web page that infects your computer with spyware? Mistakes happen, but the child may not realize what they've done or may not tell you what happened.

    Online predators present another significant threat to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick others. Children are usually open and trusting, making them easy targets. The threat is even greater if a child has access to email or instant messaging and/or visits chat rooms.

    What can you do?

    1. Be involved - Consider activities you can work on together, whether it be playing a game, researching a topic you had been talking about (e.g., family vacation spots, a particular hobby, a historical figure), or putting together a family newsletter. This will allow you to supervise your child's online activities while teaching good computer habits.
    2. Keep your computer in an open area - If your computer is in a high-traffic area, you will be able to easily monitor computer activity.
    3. Set rules and warn about dangers - Make sure your child knows the boundaries of what they are allowed to do on the computer. These boundaries should be appropriate for the child's age, knowledge, and maturity, but they may include rules about how long she is allowed to be on the computer, what sites can be visited, what software can be used, and what tasks or activities they are allowed to do.
    4. Monitor computer activity - Be aware of what your child is doing on the computer, including which web sites he/she is visiting. If they are using email, instant messaging, or chat rooms, try to get a sense of who they are corresponding with.
    5. Keep lines of communication open - Let your child know that she can approach you with any questions or concerns about behaviors or problems they may have encountered.
    6. Consider partitioning your computer into separate accounts - Most operating systems (including Windows XP, Mac OS X, and Linux) give you the option of creating a different user account for each user. If you're worried that your child may accidentally access, modify, and/or delete your files, you can give them a separate account and decrease the amount of access and number of privileges they have.
    7. Consider implementing parental controls - You may be able to set some parental controls within your browser. For example, Internet Explorer allows you to restrict or allow certain web sites to be viewed on your computer, and you can protect these settings with a password.

    Top

  • Free File Unerase Tools

    For those times when you wish you hadn't hit the Del key: Click Here

    Top


Social Engineers - How They Steal Information

The term "social engineer" refers to someone who, instead of using technical and programming skills to break into computer systems, uses people skills. The easiest way to "get in" on a computer or network is to log on with a valid user account and password, and social engineers have mastered the art of tricking people into giving them that sensitive information.

A social engineer is just an updated version of a very old type of criminal: the con artist. Social engineers con users into giving them information just like old time con men talked people into giving them money or goods. They may turn on the charm and flatter you, or they may come on strong and intimidate you. A common social engineering ploy is to call up an employee in a company and pretend to be from the IT department, claiming your account has gotten "messed up" and IT needs to "verify" your password or else you won't be able to log on to the network. Another tactic is to storm up to an employee's desk, pretending to be the company's new "head of security," and accuse him or her of releasing a virus onto the network or hacking into the big boss's files, then demanding the user's credentials in order to "check out" the employee's protestations of innocence.

The scenarios are limited only by the social engineer's imagination and patience. Some will spend days, weeks or even months building a relationship of trust (even a romantic relationship) with an employee - especially one with a high level of access or administrative credentials - in order to find out what they want to know. And they might not always need to ask for your password directly. Because many computer users choose passwords that represent something they'll remember easily (spouse's middle name, child's birthday), the social engineer may be able to discern enough info to guess your password just from learning such personal details.

"Phishing" has been discussed in this newsletter before: those email messages you get that pretend to be from your bank, credit card company, eBay or PayPal, asking you to go to a Web site and type in your account information. Phishing is an email form of social engineering. It doesn't rely on personal interaction as traditional social engineering attacks do, but it uses the same basic tactics: impersonation and deception aimed at making you reveal something that can be misused.

Social engineering is a growing problem because it's so difficult to defend against. Network administrators can put up firewalls or use access controls to protect against technology-based attacks, but the human factor is the weakest link. Social engineers take advantage of basic human nature: people like to be helpful, to provide information to those who seem to need it for legitimate purposes. People are also quick to provide information to defend themselves against false accusations. People don't give out sensitive information to hackers intentionally; they do it because they think they're doing the right thing.

The best way to keep from being taken in by a social engineer is to be aware of their techniques, and always be suspicious when someone asks you for your password. Network administrators should not need to know your password, even if they need to get into your account. A person who has an administrative account can simply change the password (without knowing the old one) and access your account with the new password. You should also pick your passwords carefully and never use personal info as the basis for your password.

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving