To Main Page




78% of respondents in a resent survey of 1300 IS managers suffered a loss related to data security in the past two years. More than a quarter of these suffered losses of up to $250,000. In 1998 the Computer Emergency Response Team (CERT) reported six security breach incidents:in 1995, there were 2,412 incidents. Over 70% of computer security breaches are from internal sources ...[MORE]




(Carlsbad CA) During the decade, the problem of computer crime has been a major concern among large corporations and law enforcement agencies. there have been dramatic news stories about computer hackers fraud and theft. many people are alarmed about the possibility of computer crimes being perpetrated through the internet, and as a result, a booming computer security industry has emerged ...[MORE]




I just received an exclusive first look at a new survey about network security. 1) Your network "is" at risk. 2) It is not from where you think. (Hint -- most problems come from the' inside".) I've got the surprising survey results, plus links to sites that teach you to stay safe ...[MORE]

Every new operating system starts out with a trial by fire. Its security is exposed to both the rigors of the Internet and internal users. A good example is Windows NT, a recent wave of attacks made the front page of USA Today. These denial-of-service attacks point out that there are two security issues involved. The first is the security architecture of the operating system itself. The second is a combination of tools and procedures to keep security levels acceptable.

NT is not Unix
While it is true that Windows NT security is well-designed, the product is relatively immature and simply needs a few more years to achieve the Unix type robustness. But if system administrators don't implement NT security features correctly, apply the latest service packs, and give NT the paranoia it requires to create a secure environment, security will be compromised.

Security holes
NT comes out of the box in a trusting mode. The security holes that were found by intruders are primarily caused by errors in the implementation and in bugs in NT. That is where the trial by fire comes in. This last year many of these bugs were exposed by hackers that in most cases simply wanted to demonstrate they were smarter than Microsoft.

Redmond countered with many post-SP 3 fixes that are downloadable from their WebSite. But it does require an alert system administrator to keep up with these changes. A great place to keep up-to-date is www.bugtraq.com.

Self Protection
If you do not follow Microsoft's security guidelines, and keep your systems updated you exposure yourself to attacks from both outside and inside. Protecting yourself is usually done by implementing two very different strategies. First of these is internal policies geared to protect the corporate data. These policies are known to be successful actions and used by many organizations. An example would be to not have passwords written on sticky notes. It is surprising though, how little these policies are actually being used.

Security tools are needed
Companies that require tight security like insurance companies, banks and government organizations would be helped by using Windows NT workstation instead of Windows 95 for their workstations. NT (network) security is a lot better, but in many cases need additional security tools to batten down the hatches. Firewalls and Audit tools are really needed to have a watertight security picture, combined with internally approved and enforced security policies. These policies have to have full Top Management backup, as without that they are doomed to fail.

Fill the holes now
Microsoft is continuously improving NT security, and in the coming Service Pack 4, a new tool will see the light. It is called the Security Configuration Editor (SCE) that will help to integrate the internal security policies. The next major evolution of increased security will be NT 5.0 with its Activity Directory enhancements. As we all now that will likely be next year at the earliest.

Today, NT provides acceptable basic security when administrators carefully deploy it and keep up with the patches that come out on a regular basis. But this alone is not enough. Security policies need to be established and enforced, and third party tools still provide an essential link in the security chain 

Stu Sjouwerman, Exec Vice Pres.,
Sunbelt Software Distribution, Inc.
ntnews@gte.net
WebSite: http://www.sunbelt-software.com

Main
Current Survey
Join Panel
Get Updates
Feedback
You are here
About the Surveys
Past Surveys
Read it 
now!
The Solution
Join Now!
The NetVital Team




MAINCURRENT SURVEYJOIN PANELGET UPDATES
FEEDBACKTHE SOLUTIONRELATED STORIESABOUTARCHIVE
Copyright ã 1998 NetVersant Technologies, Inc.