I just came a across an article that I wanted to discuss. The article is titled “10 security mistakes that will get you fired” written by Roger A. Grimes. I have know too many sysadmins and IT security specialists that have committed at least one or more of these huge mistakes. I’ll cover the highlights here with a link below as well.
Mistake #1 Killing Business Functionality
Although network security is job one to a IT professional, it is not to the company you are working for. Closing down critical business information systems while trying to remediate an intrusion can find you in hot water with management. Just assume management will believe the loss of business systems will outweigh the cost ridding the system from the bad guy.s Continue reading →
The Business Computing Weekly Podcast Episode # 412
Studies show that 60% of online shopping and 70% of internet pornography traffic occurs during normal business hours. It is wise to establish careful monitoring and control of internet usage at your business.
1: Lost Productivity
A small business with 50 employees with average costs of $20.00 per hour each = $1,000 per hour. If each employee wastes just 1 hour per week on the internet, and not working it costs $52,000 per year in lost productivity. That’s less than 15 minutes per day per employee. Some recreational use maybe ok, but within pre-approved limits, and times. Continue reading →
We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.
How do cracks work?
When hackers crack software, they modify the program’s code. Depending on the copy protection mechanics, the modification required can be as simple as changing one byte to something as complex as rewriting chunks of code. Before any of this can be done, a hacker will have to reverse engineer the software and understand how the copy protection mechanism works. This requires skill – more skill than that required to modify the software in order to defeat said copy protection. Why is this important? Someone who is capable of cracking software is probably also able to modify it in any way they see fit. This is where security risks come into play. Continue reading →