|
BuildOrBuy
Group Network |
|||||||||||||
PestPatrol News: April/May 2002Mon, 06 May 2002 16:55:08 -0700 Welcome to the April/May 2002 issue of PestPatrol News. Here's what
you'll
As always, we welcome your comments on any item covered in the
newsletter. SECTION 1: NEWS YOU CAN USEHere are half-a-dozen useful articles related to pests and security
that we've picked up recently. Read them for yourself, and pass them on to
your management as further evidence of the reality of the pest threat.
Note that some of these URLs may "wrap" in your e-mail message.
If so, copy and paste the entire string into your browser. WHY YOU SHOULD ALWAYS READ THE SMALL PRINTEvery month, millions of people agree to terms-of-service they haven't
read to download free software. Many are later disturbed to find their
computers coopted by little-known companies to distribute advertisements,
monitor online behavior, or worse. HOW YOU COULD BE A HACK ATTACK TARGETCybercriminals are targeting desktop computers connected to the Web and
the growing array of pocket PCs and hand-held devices. As mobile phones
get smarter and carry large amounts of personal data, they too become easy
meat for malicious coders. WATCH OUT FOR SNOOPING SPAMWeb sites have long planted cookies on hard drives to better target
ads. PROTECTING AGAINST MALWARE IN THE NEW WORLD ORDEROur IT infrastructure may well prove a valid target for further
attempts to damage the country's financial structures. Take steps now to
help your organization avoid any trouble down the road. With greater
attention to our IT environment, we can handle any crisis that might
arise. CAN NEW LEGISLATION HELP PROTECT YOUR ONLINE PRIVACY?According to the FTC, identity theft is the fastest-growing
white-collar crime in the US. Experts say the numbers will only get worse
unless additional safeguards are put into place. Victims can suffer
anything from minor inconvenience to spending years trying to clear their
names. PROTECTING BROADBAND CONNECTIONSHome broadband systems are often compromised; it's common for such
systems to be unpatched, misconfigured and open to manipulation. Attackers
can gain access to company data, user identification and passwords, even a
backdoor into the company network via the VPN. SECTION 2: PESTPATROL UPDATEFirst, an apology for any problems you may have experienced in
downloading the new version 3.1 a couple of weeks ago. The response was so
huge that our servers were temporarily overwhelmed, but we hope that you
weren't inconvenienced too much and that you are now enjoying the benefits
of PestPatrol 3.1. /spycookienoalert does the same as above, except that if spyware is the
ONLY thing detected in a session, no email will be sent, even if
specified. This allows systems administrators to configure PestPatrol to
send e-mail alerts only when something more alarming than spyware is
detected. SECTION 3: SECURITY FOCUS. THIS MONTH: PRIVACY ISSUESCollecting information about users has become a lucrative business. In
this new white paper, privacy expert Professor Mich Kabay, CISSP, explains
how users can get a sense of the fundamental issues that face all of us as
we try to strike a balance between efficient commerce and our concerns
about personal privacy, in the workplace and at home. SECTION 4: CUSTOMER IN THE SPOTLIGHTMatthew Crockett is IT Manager at Electronic Fasteners, Inc., one of
the original 'Route 128' companies in New England's high technology hub,
founded in 1960. It is now the largest provider of electronic fasteners to
the high technology and defense industries in New England, so network
security is a big issue for Matt. SECTION 5: EVENTS CALENDARBusiness Development VP Pete Cafarchio is on the road again this month,
with three speaking engagements. He'll be at ISACA chapter meetings on May
9 at 4pm at the Holiday Inn at Limekiln Road and I-83, New Cumberland, PA
and on May 15 at PPL Corporation, 2 North 9th Street, Allentown, PA. And
he'll be at the NovaForge industrial security seminar on external cyber
security May 9 9am-noon at George Washington University in Washington DC. SECTION 6: WE WANT TO HEAR YOUR VIEWS!Last month, we asked you what remote administration tools PestPatrol
should detect. The result was a unanimous vote in favor of our detecting
all remote administration tools. Those that you use for your own security
checks can be excluded from the scans of the systems on which they are
authorized to be installed. All of you who responded felt that the
potential for damage from such tools outweighs the "convenience"
of not scanning for |
|
Copyright
© 1992, 1994, 1995-97, 2000-2001, BuildOrBuy
Group Network News!
Web Development,
Gill
Boyd & Team
- Posted 01/18/2001; Updated
02/06/2009