IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Good Old-Fashioned Protection

4 January 2012 By Teresa Martinez

Sometimes, we fail to see the solution because our eyes are too far off from the obvious.  A case in point is the protection of our computer and its system from the physical threats that are present in the environment.  Before we even think of the the intricate digital barrier we should use to prevent malware and viruses that pervade the online world from entering our system, we should be considering the measures we can use to protect our devices which contain critical information, whether personal or business.

Good old-fashioned protection is not merely placing the computer and other devices under lock and key.  It is also about considering who has access to these locks.  A high-security risk environment will exactly be such in terms of possible theft  or intrusion.  It is likewise about protection from the natural elements like water and heat and occurences like power surges and fluctuations. 

Visitors are best received away from the regular work area.  This prevents potential information thieves from being able to read computer screens, install malware on network devices, or simply being within reach of portable devices that can be stolen without being noticed.  Desktop computers that come in individual cases can be locked to prevent tampering of  internal hardware. 

Physical protection would also entail other sensible and simple acts such as locking the personal account whenever the user needs to step away from the computer and installing security cameras in areas of specific security concern.  Not many people are aware that  the manner of placement of network cables and equipments can result to a tendency for accidental loss of information. Another important aspect of physical protection is securing the access point for those using wireless networks.  Threats can come in all forms but the simplest defense is usually the most important.

Filed Under: Physical Security Tagged With: physical protection, Physical Security

Keep Track of Computer Room Activities

23 November 2010 By Saran

For most companies, the computer room where the company servers containing the delicate data originating from daily transactions is the most important place in the office. So while the people here are trying to figure out ways to safeguard these servers, it would be likewise important to consider external security measures such as placing locks and monitoring the activities with the use of spy cams.

Why is this important? The right question should be geared on how well do you trust you IT personnel. Evaluate their personality and see the extent to which they may betray the company and place operations in jeopardy. This not of course to discredit them but in reality, a lot of people use their knowledge and access as leverage towards being able to command salaries and money-related deals that many of us know as blackmail.

Also, physical intrusion is always a possibility. No matter how secure your area would be, it can be breached at anytime if you do not address the right measure to make it harder for them to gain access to the computer room. In short, the harder it is to get in to you computer room, the better it is. This only means you have prepared on the physical aspect of securing your IT area which is a good approach the sake of safeguarding hardware and data.

Filed Under: Physical Security, Real-World Issues Tagged With: Physical Security, security, spycams

Tape virtualization guidelines

29 June 2010 By Saran

mainframes

Greg Schulz of Computerworld shared some guidelines of tape virtualization. Tape virtualization is one of the popular topics when it come to storage. Some of the said advantages of making virtual tape libraries would include improvement of the performance of the back up, archiving and other related processes and smooth transition (from tape-based to disk-based).

Here are the ten points he raised in his article:

1. Integration of VTL in your business continuity, conditions of your site/location.
2. Storage devices to be attached to the VTL.
3. Projected storage capacity needed in the future.
4. Backup, archiving, etc. software supported.
5. Support of differencing or single-instance repository capabilities.
6. Determine if you are looking for a turnkey solution.
7. Resiliency and redundancy needed.
8. Security level needed.
9. Tape device and library emulation for your environment.
10. Necessary changes to your current setup.

The questions he raised in his article really make you consider your needs and the conditions of your system. All these questions will help you evaluate if you would use virtualization. You cannot just decide right away if you will use VTL because it could affect your system in a major way.

It is always good to look at the possibilities before arriving at some decisions like this one. It is best to do a full study before you spend on it. One of the important things you also have to consider would be the people who would be in charge of this project in your company. Who will be the ones in charge of the study and the follow up in case you do push through with it. Your data will be at stake so it is better to be safe than sorry.

Filed Under: Backups, Physical Security, Storage, Tips Tagged With: Backups, Physical Security, Storage, Tips

Firewalls and Wide Area Network (WAN ) Intrusions

18 January 2007 By Saran

Experiencing connection problems and slow transfer of data may occur at any given time for most networks. While most would immediately identify the network cards, computers, cabling or network configuration at first, the presence of unknown processes of the operating system or possible intrusions such as DOS or Ping attacks can also be considered as possible factors for the deteriorating speed issues for network administrators.

Firewalls

Such instances are only normal, especially for wide area networks, or networks exposed to the Internet. The mischief caused by such people can be expected, especially for people who love to try their talent in hacking and network intrusions. The prize of which is that of creating discomfort and headaches for companies that thrive on networks for business and profit.

While there are network monitors available, it would be best to get the best firewall software there is today. Some do not value the firewalls and their use until such issues arise, but just like the war on terrorism, it would be best to take on security measures before they occur to avoid bigger problems once their mischief succeeds.

Filed Under: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security Tagged With: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security

Next Generation Robotics with Feelings?

10 January 2007 By Saran

Cybernetics

We are all aware the field of cybernetics has slowly been penetrating the market, especially from the side of Japan. Miniature androids or robots have been seen as the next generation of machines that will aid human in their daily work, both in personal and business aspects. They are programmed to carry out any task as required without complaints since machines are deemed to be objects that do not have feelings.

However, various insights have shared that the eventual robots may come to a point where they would be created to have feelings. Playing god is what people would tag the creators of such a race and should this become a reality, the movies that we are used to seeing such as I-Robot may eventually come true. Although this development may be exciting to most people who love to invest on technology, the question of up to what extent these inventions would be as far as playing god is concerned will still be big question mark that will be in the air of technological breakthroughs for future gains.

[tags]robotics, robots, cybernetics, technology, automation[/tags]

Filed Under: General, News, Physical Security, Real-World Issues Tagged With: automation, cybernetics, General, News, Physical Security, Real-World Issues, robotics, robots, technology

The Bearing of an Internet Gateway’s Malfunction or Breakdown

4 January 2007 By Saran

Broken Chain in the Web

A lot of people have probably heard about now about the earthquake that hit Taiwan during the holiday break. While the natural disaster caused a lot of discomfort to the Taiwanese community, the world has suffered as well in terms of Internet connection speed.

Taiwan is among the chains or gateways to which the Internet also passes through. Similar to that of a hose that allows water to pass through from one point to another; one hole in it will lower the pressure of the amount of water that should be traveling. In the same way, the underground cables to which help transmit Internet connections from one point to another were damaged and thus today, many are experiencing lousy connection speeds. This has thoroughly disrupted the flow of operations, becoming a discomfort that has left surfers and professionals totally helpless.

Natural disasters are hard to predict. The best that technology personnel can do is come up with better cable durability, but this is no promise for disruptions as we are experiencing today. Among the millions that have been damaged by this untimely event, technology based companies and organizations are surely suffering the most for the gapping whole in the entire connection the web provides.

[tags]internet, gateway, connection, fiber optic, cabling[/tags]

Filed Under: Network Security, News, Operating Systems, Physical Security, Real-World Issues, Wireless Security Tagged With: cabling, connection, fiber-optic, gateway, internet, Network Security, News, Operating Systems, Physical Security, Real-World Issues, Wireless Security

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security