Use Strong Passwords; Write Them Down or Use an Encrypted Password Database. Consider Using Two-Factor Authentication Instead of Passwords.  
  Use Anti-Virus and Anti-Spyware Software.  
  Protect Against Internet Intrusions.  
  Regularly Check For and Apply Security Updates.  
  Routinely Back Up Your Data, and Verify You Can Restore From the Backup.  
  Apply Common Sense When Dealing with E-mail.  
  Be Aware of the Risks of File-Sharing.  
  Routinely Check for Suspicious Activity.  
  Educate Your Employees About Your Security and Acceptable Use Policies.  
  Develop and Continually Refine a Disaster Recovery / Business Continuity Plan.  
  Limit Access to Sensitive and Confidential Data.  
Home About Me Contact Support BLive To Me! Monthly Specials
 
 



Be Aware of the Risks of File-Sharing.


Why bother doing this? If you use file-swapping services, you will probably get more than you bargained for...



Use caution when participating in Peer-to-Peer (P2P) file-sharing networks

   In 2003, 7 of the 9 most popular P2P tools, downloaded by more than 320 million users, came with spyware or adware.
 
   Spyware often remains active even when the original file- or music-sharing software is un-installed, requiring extra steps to ensure that your computer is not continuing to leak your confidential information.

   Proper configuration of file sharing settings can be difficult: you may end up sharing access to all files on your computer in addition to or instead of the "media" files you thought your were sharing.

   FTC/GAO reports indicate that P2P networks are frequently used to exchange business-inappropriate content such as pornography.

   KaZaA is listed by Computer Associates' Spyware Information Center as one of the worst Spyware threats (eWeek article, 26 Nov 2004), and Grokster is the most rapidly spreading spyware in July 2005.

   Even BitTorrent is not immune to exploits by makers of adware and spyware (eWeek article, 15 Jun 2005; see also security researcher Chris Boyd's VitalSecurity.org nonprofit resource center).

 
The US Supreme court has recently ruled against Grokster and other file-swapping services.

  The full implications of this ruling are not yet known, but if you participate in file-swapping services, or permit their use within your business network, you could end up exposing your company to financial penalties.


Use caution when introducing unknown external software or hardware to your computer.

  While boot-sector viruses are no longer the predominant mode of infection, they still exist and can cause damage to system files or loss of your data files.

Next...

top

 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices