The DataGuard Data Protection Newsletter
May, 2006

To subscribe: Click Here
Newsletter archives: Click Here
Suggestions, comments: Click Here


Welcome!

If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com

Top


Bullet Points

  • Pandemic Planning

    It seems that now, business continuity planners are focusing on the possibility of a flu pandemic:

    http://www.continuitycentral.com/feature0331.htm

    Top

  • Free Security Threat Test

    http://sb.symantec.com/jp/sym169.cfm?JID=29&PID=1145564

    Top

  • Spear Phishing

    "Phishing" is the term used to describe attacks that involve the mass distribution of spoofed e-mail messages with return addresses, links, and branding which appear to come from large corporations (e.g. banks, eBay) with fraudulent messages designed to fool you into divulging personal info. Up until fairly recently, these phishing attacks were very broad-based. For example, they typically targeted eBay users with huge bulk emailings. Now, they have become more and more targeted, perhaps preying on customers of a small local bank. This targeted phishing attacks have been dubbed spear-phishing attacks.

    The U.S. continues to play the role as the largest source of malware, spam and phishing attacks, hosting 18.1 per cent of the world's compromised (zombie) computers in the first quarter of 2006 (down from a high of 44 per cent in Q2 05).

    Previous trends, such as viruses and phishing both becoming increasingly targeted, continued to intensify. (According to an April MessageLabs Intelligence Report)

    "The growing trend of more targeted attacks was something we started to see in 2005 and we're continuing to see it gain momentum and also increase in sophistication. We are now also seeing this targeting move into other categories, such as with the increase in 'spear-phishing,'" said Mark Sunner, chief technology officer, MessageLabs. "While overall threat numbers remain largely stable, this only tells half the story. In reality, the cyber criminals are becoming more adept at drawing less attention to themselves, by sending out highly targeted virus and phishing attacks in smaller numbers, running smaller botnets and ultimately finding new ways to make money from victims around the world."

    Top

  • Determining if a Web Site is Secure

    This discussion is a bit technical but it does give some interesting insite into secure web sites:

    http://techrepublic.com.com/5100-1009_11-6055958.html?tag=nl.e101

    Top

  • Shred Those Old CDs/DVDs

    http://www.cyberguys.com/templates/searchdetail.asp?productID=10085

    Top


Security Practices for Small Businesses

Here is a great list of things small businesses can do to improve security that was published by Symantec, the anti-virus software and security people:

Small businesses face the same online threats as large corporations. Whenever you and your employees are online, your business is exposed to security threats. By implementing these recommended security practices, you can help protect your information.

  • Install antivirus software on all desktops, laptops, and servers to prevent virus infection.
  • Use a firewall on all desktops, laptops, and servers to block intruders.
  • Keep current with operating system and security software updates to ensure you have the latest protection.
  • Create strong passwords with at least eight characters combining alphanumeric and special characters. Change passwords every 45-60 days.
  • Open email responsibly. Never open attachments from unknown senders. Don’t respond to spam.
  • Enable the security settings on your Web browser and do not enable file sharing.
  • Back up important data regularly and store extra copies offsite.
  • Secure all remote computers with antivirus and personal firewall software. Evaluate the benefits of a virtual private network (VPN) that provides a private “tunnel” to your business.
  • Secure wireless connections with a virtual private network (VPN) and install firewalls.
  • Follow routine physical security precautions from using the screen-locking feature to locking down laptops with a cable.

Top


To subscribe to this newsletter: Click Here
DataGuard archives: Click Here

Related Services from High Caliber Solutions:
    Data Protection Services
    Disaster Planning
    Email Archiving