Thursday, January 27, 2005

InfoWorld: Living on the Razor edge

Image hosted by Photobucket.com
======================================================================== SECURITY ADVISER: BOB FRANCIS http://www.infoworld.com ======================================================================== Thursday, January 27, 2005 Network protection commentary by: Bob Francis LIVING ON THE RAZOR EDGE By Bob Francis Posted January 21, 2005 3:00 PM Pacific Time I went to a local meeting of the Information Systems Audit and Control Association (ISACA) to hear a presentation by Mark Loveless, who heads up Razor research for BindView. It promised to be an enlightening evening. ADVERTISEMENT -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Stop Spyware at the Gateway with Blue Coat. Spyware is more than a threat to company security. It's a growing productivity issue, too, crashing infected machines, clogging networks, and overwhelming IT help desks with support requests. By some estimates, spyware already infects some 90% of desktops. Find out how you can protect your business against these growing threats. Download our new white paper, Spyware Prevention for the Enterprise, or register for a live webcast and Q&A at: http://newsletter.infoworld.com/t?ctl=B38EFE:353CA35 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- BindView develops business policy compliance, vulnerability management, and directory administration software for large corporations; the company's Razor team develops the vulnerability checks, best practices, and compliance algorithms behind BindView's products. Basically, they keep up (or attempt to keep up) with the hackers and computer security troublemakers out there. Loveless is a fairly well-known name in the security community. He is the founder of the Nomad Mobile Research Centre (NMRC), a large virtual lab that conducts independent -- very independent -- research on computer security issues. To say that Loveless is out on the edge in computer security would be an understatement. Browse the NMRC site long enough and you will quickly see that Loveless is a bit of a rebel. "To catch a hacker, you have to think like a hacker," is one of his mottos. Wandering around the NMRC site or hearing Loveless speak, you quickly get the idea that this guy knows what he's talking about and seems to eat, drink, breathe, and generally live this stuff 24-7. In other words, when you're looking for a go-to guy in computer security, you could do a lot worse that Loveless, and probably have. So what did Loveless tell this ISACA group? For the home user, he recommends running Linux and using Mozilla FireFox and OpenOffice instead of the usual Windows, Internet Explorer, and Word. No surprise there, security-wise. But Loveless is not blind to the fact that many people must use Windows (hey, not everyone can be a big-time Linux geek). He recommends using Microsoft's SP2, which includes Microsoft's Security Center, if you are running Windows XP, but still suggests FireFox in lieu of Explorer. He also believes Microsoft's Security Center is, or at least will be, a good thing in the long run. For people and companies using wireless technologies, he suggested using Wireless Equivalent Privacy (WEP) for at least minimal protection. He also advised against dual tunneling -- which allows users to attach to the corporate network and the Internet at the same time -- when using a VPN to connect with headquarters. This feature allowed hackers to break into Microsoft's own corporate datacenter by way of a remote worker and steal Windows source code several years back, Loveless noted. As another security measure, Loveless also advised companies using VPNs to turn off access from some countries, such as Korea, where there are many compromised machines. "If you don't have any workers in Korea, turn off access and limit your exposure," he said. For the corporate user, Loveless has a more complicated story. He advises corporations to enforce security policies and standards such as HIPAA, Sarbanes-Oxley, and Federal Information Security Management Act (FISMA) on all servers and workstations, not to mention covering all points of access on the network. Loveless was also adamant about the dangers of hotels and hotel networks. "When I was at one conference, I connected up to the hotel network and found three people out looking to find a vulnerable system," he explained. Loveless said that because many mobile systems are the last to be updated, they are often the weakest link in the security chain -- but also the most vulnerable. If you do need to connect through these networks, Loveless suggests making sure your systems are updated with the latest patches and using a firewall to minimize risk. Next week, I will give you the lowdown on what Loveless told the group about who the hackers and computer security troublemakers are. Here's a hint: Hackers are probably making more money than you. Bob Francis is a senior writer at InfoWorld. ======================================================================== Ever wonder how others keep up with web services? Your peers will tell you, although your competitors probably won't. This is how more than 63,000 people keep up with the fast-moving news about web services: the Web Services Report newsletter. Scan its quick summaries of the week's biggest news in web services, then move on or click through for the full story. It may not be the only way to keep up with web services, but it's the easiest. Subscribe at http://newsletter.infoworld.com/t?ctl=B38EFA:353CA35 ADVERTISE ======================================================================== For information on advertising, contact Elisabeth_raphel@infoworld.com. UNSUBSCRIBE/MANAGE NEWSLETTERS ======================================================================== To subscribe, unsubscribe or change your e-mail address for any of InfoWorld's e-mail newsletters, go to: http://newsletter.infoworld.com/t?ctl=B38EFB:353CA35 To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew or correct a problem with any InfoWorld subscription, go to http://newsletter.infoworld.com/t?ctl=B38EFD:353CA35 To view InfoWorld's privacy policy, visit: http://newsletter.infoworld.com/t?ctl=B38EFC:353CA35 Copyright (C) 2005 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107 This message was sent to: GDEWILDE@GMAIL.COM