Archive | October 2009

Enterprises Are At Significant Risk From Common Endpoint Device Security Gaps

Security threats are coming from all fronts – both offline and online. Unreliable websites are great contributors for malwares. Network endpoints are the main sources of threats on the offline side.

In an effort to help IT departments evaluate and better secure their network endpoints, such as desktops, notebooks, smart phones, MP3 players and thumb drives, Novell announced initial results from its Threat Assessment survey which show that many enterprises are still highly vulnerable to preventable security threats.
Read More…

Five Issues Enterprises Should Examine With Windows 7

Last October 22, 2009 Microsoft officially launched Windows 7. Aside from its features, the next big issue is whether it’s worth the upgrade especially to the enterprise market.

According to Gartner Inc., it is nearly inevitable for enterprises to move to Windows 7, but this does not mean that the PC industry will see a significant boost in PC sales immediately. Gartner added that Windows 7 release will generate renewed interest in hardware upgrades in consumers and small businesses following its release, but corporate demand is not expected to gain momentum until the end of 2010.
Read More…

10 Requirements of Data Loss Prevention Part II

In my last article, we discussed the first five requirements of Data Loss Prevention (DLP), including accurate identification of data; the ability to address data whether at rest, in use or in motion; both content and context analysis; an advanced policy framework; and robust workflow and reporting.

The remaining five requirements of an effective DLP solution are as follows:
Read More…

Survey shows most companies ban Twitter and Facebook on job

Social networking sites are very popular nowadays. If you don’t have a Facebook page, people may raise their eyebrows and ask you WHY? Facebook is a great venue to meet new friends and to stay in touch with old friends. Other companies even include Facebook as part of their marketing strategy.

But a recent survey developed by Robert Half Technology shows more than half (54 percent) of chief information officers (CIOs) interviewed recently said their firms do not allow employees to visit social networking sites for any reason while at work.
Read More…

10 Requirements of Data Loss Prevention Part I

Data loss is something that can be very traumatic. Whether it’s a business with important files and documents, or an individual with precious pictures and videos, losing data can be a very stressful situation. If you’ve never experienced hard drive failure or losing data before, it can indeed be a situation where you find yourself wondering what to do.

Websense, Inc., a company that specializes in integrated Web, data and email security solutions suggests that businesses must implement a DLP solution that addresses these key requirements:
Read More…

How to avoid becoming a phishing attack victim

The recent phishing attacks on Hotmail, Gmail and Yahoo! Mail, which resulted in thousands of email addresses and passwords being posted online, have worried internet users.

Phishing is act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Read More…

PC Monitor Sales Improve Across Asia/Pacific Markets

To an ordinary PC user, a computer monitor is simply a computer monitor. Some may buy a monitor based on the design, resolution and more importantly – cost. As much as they want to buy the best computer monitor, price consideration comes into play. Currently, LCD monitors or flat-screen monitors is one of the most sought after monitor type in the PC market.

According to the latest IDC Asia/Pacific Quarterly PC Monitor Tracker report, the PC monitor market in Asia/Pacific excluding Japan (APEJ) region totaled 29.5 million units in 1H09, representing an increase of 4.8% over 1H08, and 7.6% over 2H08. The healthy demand for entry-level LCDs due to increasingly affordable 16:9 units lifted the market to beat forecasts by 6.1%.
Read More…

Survey Reveals Internet Users of All Skill Levels Fall for Cybercriminals’ Tricky Tactics

Cybercriminals are getting smarter in their ways in penetrating user PCs. Take that case of the recent Typhoon Ondoy, in just a couple of days a computer virus named Ondoy is already in the wild. To make matters worst, a fake Ondoy anti-virus was also made available to users to download but in reality, the supposed anti-virus application is a virus as well.

When Michael Jackson died, a Michael Jackson trojan was launched in the wild. When former President Corazon Aquino passed away, a Cory virus was also made available. Which makes me wonder, who are more inclined to be lured into such a trick?

According to a new survey from Webroot, computer-savvy consumers are more susceptible than novices to “fake alerts” and rogue security products – bogus malware infection warnings and malicious programs masquerading as legitimate security applications.
Read More…