The DataGuard Data Protection Newsletter
November/December, 2005

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • How Hackers Install "Backdoors"

    Computer attackers often install backdoor programs to allow them to get on your network and/or individual computers. A backdoor is a secret passage into your computer system allowing the attacker repeated access without your knowledge. The obvious question is "how did the attacker get the backdoor software installed on my computer in the first place?"

    The answer in most cases is through a Trojan of some sort. A Trojan is a malicious program hidden within a seemingly useful piece of software. Trojans don't run automatically; they are usually designed to trick a user into running them.

    The backdoor program normally installs a server component on the compromised machine. That server component then opens a certain port or service allowing the attacker to connect to it using the client component of the backdoor software. Some backdoor programs will even alert the attacker when a compromised computer is available online.

    How can you protect your computer from backdoor software?

    • Never open any suspicious email attachments
    • Never install pirated or otherwise questionable software
    • Never open file attachments received via Instant Messaging (IM)
    • Steer clear of files downloaded from peer-to-peer (P2P) networking systems such as Kazaa
    • Make sure your antivirus software is up to date

    Top

  • Better Backups

    Here are some tips on how to make sure that the backup component of your data protection plan is as good as it can be:

    1. Remember that traditional backups are a last resort for data recovery. Data replication and snapshots should also be parts of your plan.
    2. Review backup logs daily. Log analysis can be time-consuming, but is essential to reliable backup.
    3. Protect your backup catalog. All backup applications maintain a database or catalog that's absolutely critical to the recovery of backed up data. Lose the catalog and you've lost your backups.
    4. Make sure that backups are completing within the expected time frame. In addition to affecting production environments and angering users, jobs that approach or exceed the backup window may be warning signs of impending capacity limits or performance bottlenecks.
    5. Centralize and automate backup as much as possible. A key to successful data protection is consistency. All data of equivalent value and importance to the organization should be managed in a similar fashion.
    6. Create and maintain an open issues report for all backup problems.

    Top

  • What You Need To Know About Pharming

    Many security experts are concerned about this more technically sophisticated attack:

    http://www.csoonline.com/read/100105/pharm.html

    Top

  • Email Administration Mistakes To Avoid

    • Not Having a Contingency Plan
      Make sure your email systems (servers and workstations) are included in your organization's business continuity plans. Also, don't forget to have a backup email administrator who knows the system (configuration, passwords).
    • Not Testing Backups
      Test your email and other backups often to make sure the data will be there when you need it.
    • Poor Communication With Human Resources
      If you don't know who just joined the company, who is going to be out for a while and who quit or got fired, bad things can and will happen eventually.
    • Allowing IT to Monitor and Filter Email Content
      Human resources should do this, not technology personnel.
    • Spend Too Much Time Worrying About Spam
      Your time would be better spent implenting a spam filtering system so you can focus on other, more important issues.
    • Taking the Security of Email Servers For Granted
      Email servers are often the point of entry into your network. Make your email server(s) your most highly secured systems.
    • Falling Behind on Maintenance Tasks
      Implement critical updates ASAP. Regularly monitor email storage space.
    • Overlooking Data Retention Requirements
      Mandates for retaining email messages as business records should come from upper management and legal counsel. However, you still should help evaluate, recommend and implement document management or other retention systems.

    Top

  • Protecting PDA's (Revisited)

    This topic was initially covered back in May 2005. Since more and more people/organizations are investing in these devices, some additional discussion might be in order.

    According to Prakash Panjwani, senior vice president of business development for Certicom, which develops security software for PDAs, companies are now seeking the same level of security with PDAs that they once sought for laptops. "In the past," says Panjwani, "these were consumer devices that snuck into the enterprise. You got it as a gift, and then you started downloading corporate information, and your IT managers didn't even know about it. Now that has changed because [companies] realize that the ultimate responsibility is the IT managers'."

    Although the cost of the hardware isn't huge, the value of the information can be. The idea of a stranger having access to your personal data may be distressing, but the possibility that somebody could access presumably secure corporate information is enough to give any IT professional nightmares.

    The corporate use of PDAs poses two security problems, says Panjwani: controlling data access through remote connections and unauthorized access to the data. The first can be handled in the same way that it has been for remote laptop users: by using a VPN client that will interoperate with the existing VPN on the back end. The second is trickier. "If an employee leaves the PDA at a meeting," he asks, "and somebody just glances over and looks at the information, how do you actually protect that information?"

    As a result, there are now many software products that can protect valuable data in PDAs that are lost or stolen. They offer varying degrees of protection.

    The simpler, and less effective, are all available on a consumer level and implemented on a device-by-device basis. For example, a basic way to protect data is to use a "digital wallet." Originally a term for encryption software that protected e-commerce information, it is now used by a number of inexpensive applets that create encrypted databases where you can store sensitive information, such as passwords or credit card numbers. These include Developer One's CodeWallet, Ilium Software's eWallet, and PassKey from Application Development StudioA.

    A more useful way to keep data both safe and separate is to keep it on a storage card. A number of programs, such as Paragon Software's Cryptographer for the Pocket PC, encrypt information that is stored on CompactFlash and PCMCIA cards.

    Some applications offer basic data encryption for specific files and/or folders, so that users can protect crucial information without having to encrypt the entire contents. These include Applian PocketLock for the Pocket PC and seNTry 2020 by SoftWinter.

    Top


Setting Recovery Time Objectives (RTO's)

The term "recovery time objective (RTO)" always comes up when you are discussing business continuity and disaster recovery. RTO is the maximum amount of time a business can allow to bring a failed system back online before operations are adversely effected. Thus, business people should establish RTO's, not IT people.

People involved in the business-end of an organization need to perform a business impact analysis to determine RTO. This analysis should address the following items:

What the business unit does: Create a list of the various things for which a business unit is responsible, including revenue generating activities and what happens when a specific business process stops.

Potential losses: Determine the tangible and intangible losses an outage can cause. Losses can include lost revenue, salaries paid to idle workers, added expenses, fines, etc. Intangible losses include damaged reputation, negative public opinion, depreciated stock value, etc.

Timing: Take into account the worst possible time at which an interruption might occur (i.e., quarter-end, year-end, etc)

Dependencies: Identify things that are required to perform a specific business function.

Contigency Plan: Formulate a contingency plan that could temporarily buy some time and increase RTO.

Once potential losses have been identified, the business can make a decision regarding what it considers acceptable losses. Because losses are incurred over time, this decision also dictates the maximum outage the business can tolerate for each specific function. The RTO for the business functions must therefore not exceed that maximum tolerable outage.

Recovery time determinations must also always consider notification, response and procurement delays, as these elements can eat into the RTO before the actual recovery effort even begins.

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving