Tag Archives | Security

In Case of Emergency, Should the White House Control the Internet?

Obama shuts off InternetCnet’s Declan McCullagh has a good story up on a Senate Bill sponsored by Senator Jay Rockefeller (D-West Virginia) which would give the White House the power to disconnect private computers from the Internet in the case of a cyberemergency. McCullagh says that the bill, a revised version of one floated last spring, remains troubling to Internet and telecommunications companies and civil liberties groups, who say the the new version remains vague about the powers it grants.

Let’s take a T-Poll on it–and just to remove politics from the issue (and despite my silly piece of art), let’s make this question about a fictional President of the United States of unspecified political party, not the guy who happens to be there right this very minute…

14 comments

Small-Business Security Webinar Wrap-Up: Archived Edition, Attendee Questions

Small Business Security Webinar

I had a great time conducting a Webinar on small-business security over at Verizon’s Small Business Center last week. If you wanted to attend but missed it, you can check out the one-hour archived version here.

Folks who attended the event asked some smart questions, but time constraints prevented us from responding to all of them. Here are quick answers to a few more of the questions that attendees submitted.

What are your thoughts on Web-based servers such as https: sites vs traditional servers in terms of security? I’d worry less about the fundamental safety of the two approaches and more about the specifics of particular implementations–a Web service provider who does a great job of protecting your data will keep it safer than it would be on a not-very-well-protected traditional server in your company. Of course, there are plenty of horror stories involving companies doing a crummy job of protecting data on the Web. Bottom line: Don’t trust vital data to a Web service provider without asking tough questions about what it does to safeguard data. Also, remember that the fact a service uses https: to log you in doesn’t mean that it’s doing anything to protect your documents once you’re logged in. (Here’s a Google blog post on that issue.)

Is a single firewall sufficient? i.e. Windows, router, virus provider etc? First of all, you definitely shouldn’t run more than one software firewall at a time on a PC; multiple firewalls can conflict with each other. If your router’s the sole source of Internet connectivity for the machines on your network, and it has a solid built-in firewall, and you’ve configured it well, it should be your primary source of protection. It’s a good idea to make sure it’s monitoring outbound communications as well as inbound ones, to defend against malware which sends data from PCs on your network back out over the Internet. And you still might want to run firewalls on local PCs just in case (I do, including on Macs).

Securitywise, what do you think of remote access solutions such as GoToMyPC or LogMeIn? I’ve certainly known IT managers who wince at the very idea of remote control, since it opens up the possibility of users on a network putting their computers on the Internet without permission. Both of the services you mention offer plentiful security features (here’s info on GoToMyPC’s and here are details on LogMeIn’s); I’d fret less about hackers penetrating them and more about staffers getting sloppy with their passwords. And I’d fret less about that than I would about malware that lets hackers install their own pernicious remote-access software on your PCs.

What can we do if we have already blocked Facebook, Twitter, MySpace etc. and employees use backdoor sites that allow them to get through? You can block access to social networks. You can block the anonymous proxies that lets people get to social networks even if you’ve blocked them. But if you’ve got a smart enough geek on your staff, I’m not sure if it’s possible to use technology to absolutely, positively prevent that person from doing stuff on the Web which you don’t want him or her to do. Which is why a significant component of small-business security ultimately boils down to setting policies, making clear what will happen if they’re violated, and finding employees who you can trust.

3 comments

Smart Security for Small Businesses

Small Business Security WebinarJust a quick reminder: I’m hosting a Webinar on small business security tomorrow, Wednesday, August 19th at 2pm EST. I’ll cover real-world security tips and strategies, especially those that can help prevent problems from happening in the first place. I’ll also field questions from the audience.

The Webinar will happen at Verizon’s Small Business Center, and if you can’t make it tomorrow, it’ll be available in prerecorded form, too. Here’s a page on the Small Business Center’s program of Webinars, and here’s the registration page for mine.

Hope to see some of you there!

No comments

I’m Hosting a Small Business Security Webinar

Small Business Security WebinarDo you run a small company? I’m tickled to announce that I’m hosting a Webinar I created on small business security on Wednesday, August 19th at 2pm EST. (It’s a topic that’s near and dear to my heart–in part because security was consistently the single most popular topic when I worked at PC World, and in part because I run a small business myself these days.)

I’ll cover real-world security tips and strategies, especially those that can help prevent problems from happening in the first place. I’ll also field questions from the audience. (In fact, if you have any questions now, throw them out in the comments, and I’ll try to answer them during the event.)

The Webinar will happen at Verizon’s Small Business Center, and if you can’t make it on Wednesday of next week, it’ll be available in prerecorded form, too. Here’s a page on the Small Business Center’s program of Webinars, and here’s the registration page for mine.

Hope to see some of you there!

5 comments

Denials of Service: Scary? Annoying? Neither?

T-PollTurns out it wasn’t just Twitter that someone tried to bring down via Distributed Denial of Service today. Cnet’s Elinor Mills is reporting that a Facebook executive says that a pro-Georgian activist with accounts on multiple social media sites was targeted, and that Facebook, Blogger, YouTube, and other sites were also under attack. Everybody else who used the sites was apparently just caught in the crossfire.

Hence today’s T-Poll:

4 comments

Twitter Goes Down, Down, Down

Twitter goes downWhen Twitter is having reliability problems, the site is usually able to at least summon up a cheery FailWhale by way of apology. This morning, however, the nation’s  hottest social networing site has been the victim of a massive and effective Distributed Denial of Service attack. The problems apparently started around 6am PT this morning, and continue on–I’m only able to get in sporadically at the moment.

The site is hiccuping back to life, though, which is good, since it lets Twitter fans tweet about the unavailability of Twitter:

Twitter down

Here’s hoping that the trouble ends soon, and that we learn what happened–and that there aren’t too many Twitterhaters out there who are openly or silently gleeful this morning…

5 comments

Black Hat: Internet Rendered Safe for Buying Stuff

kamboard2_72tcDan Kaminsky once again brought a full batch of his grandmother’s lacey cookies, along with their maker, to his session at the Black Hat Briefings security conference in Las Vegas yesterday afternoon. On this, her third visit, grandma heard about another major security  breakthrough.

Kaminsky’s talk focused on website certificates, one component of performing SSL-encrypted transactions over the Web. The session drew a standing-room only crowd in one of the largest halls available at the conference. The problems Kaminsky discovered, if they had remained unfixed, could have put at risk virtually any online transaction where money changes hands. In this scenario, criminals might then use such certificates, issued in the names of legitimate businesses, to boost the legitimacy of phishing attacks.

kaminsky_1The bottom line is good news. Kaminsky worked with software companies in advance of the talk, and the various issues he reported have either been fixed already, or are in the process of being fixed, in every major OS and Web browser. Thanks, Dan, for saving the Intarwebs once again.

No comments