Read Bennett Gold LLP's privacy policies and practices regarding this web site.
LINK TO: Bennett Gold LLP's Privacy Policies and Practices. E-CommerceALERT.com is part of the Bennett Gold LLP web site network.
LINK TO: Bennett Gold LLP, Chartered Accountants, home page.
LINK TO: E-CommerceALERT.com Home Page.
CLICK to GO BACK to Main Page.

Research and retrieval of news articles by Bennett Gold LLP, Chartered Accountants


SPECIAL NOTE TO ALL VISITORS:
Effective December 31, 2012, articles are no longer being updated on this web site.
The site is now maintained as an historical archive, covering articles from the period 1999 to 2012.


TODAY, MORE THAN EVER, WE MUST THINK ABOUT SECURITY

System penetrations are a growing problem. Here's what you can do about it.

Source: Internet Security Advisor Magazine

Posted on January 20, 2001

      The February 2000 denial of service attacks on the Internet highlighted the need for security in your IT environment. This is especially true for all your externally visible systems, such as Web servers and firewall devices, especially if those systems support e-commerce.

      The February attacks received a lot of coverage in the press. Viruses continue to be an ongoing issue for your business, as do penetrations where your Web site is defaced or your URL hijacked.

      In addition to external threats, internal security breaches continue to be the single largest security concern for businesses. Depending upon the statistics you read, anywhere from 60 to 85 percent of all computer-related crime stems from internal sources.

      According to the International Computer Security Association (ICSA), privacy was the single greatest concern of the ordinary, Internet-using public in 1999. This is a valid concern, as shown by the Fourth Annual Computer Security Institute/Federal Bureau of Investigation (CSI/FBI) Computer Crime and Security Survey in 1999, which stated that computer crime is a growing problem for U.S. companies, financial institutions, and government agencies.

      It isn't enough to prepare for attacks from the outside. You also have to consider threats from inside your organization. System penetrations by outsiders increased for the third year in a row last year. Unauthorized access by insiders also rose for the third straight year, with 55 percent of the respondents reporting incidents. Those reporting their Internet connection as a frequent point of attack rose to 57 percent in 1999, up from 37 percent in 1996.

      According to the ICSA, insiders cause 60 percent of computer abuse. Eighty-five percent of computer break-ins occur internally, and insiders remain the most serious threat to your intellectual property.

      The CSI says one of five Internet sites has suffered a security breach, and according to an Ernst & Young Security Survey, over 90 percent of Fortune 500 networks have been hacked.

      As a result, it isn't enough that you understand the need for security. You must also understand that security, like any other business function, is a result of numerous technical and administrative mechanisms. There's no silver bullet, magical tool, or product that addresses the entire spectrum of security concerns.

Steps to take

      So what can you do to secure your IT infrastructure?

      Start with the small and work to the large. If you haven't already, evaluate your security needs as they relate to your business needs. You'd be surprised how many companies are unable to determine what data or information they consider proprietary and/or why. Scary.

      Before something can be protected, you must know you need to protect it. Start with a security policy that identifies and explains your enterprise security requirements. Make sure to address such issues as identification and authentication, password guidelines, malicious software, and standard host/server software settings (for UNIX, Linux, and Windows NT, etc.).

      After you know what you need to protect and why, look at the existing architecture. Have you spent tons of money on a firewall but left phone lines uncontrolled? Do you have a demilitarized zone (DMZ)? Is it configured so all communications are brokered by the firewall device? Common architectural problems can lead to significant security breaches.

      You also need to evaluate the configuration of existing systems. Do you have the appropriate security features correctly implemented and configured? In many cases, systems are penetrated because available security mechanisms were misconfigured or even turned off.

      Use controls such as mandatory passwords or minimum password lengths. Consider performing an internal assessment or audit and evaluate your findings against your stated policy.

      If you're worried about external penetrations, try one on yourself. You can easily scan your own network with tools freely available on the Internet. The same goes for scanning your telephone lines. In addition to these freeware/shareware tools, you can purchase one of the many commercially available products. These are very basic steps that many companies overlook when they're implementing enterprise IT solutions.

By Dr. Bruce V. Hartley, Technical Editor




CLICK to GO BACK to Main Page.

E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca

In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes.


ALERT
ARCHIVES
Final Entries
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999


LINK TO: Bennett Gold Chartered Accountants: A Licensed Provider of WebTrust Services.

WebTrust Is Your
Best Defense
Against
Privacy Breaches.

Get WebTrust
Working For
Your Site.