Skip to main content

Posts

Showing posts from June, 2010

Cyber Attacks Decline, But Still Top Business Concern

This is a guest article by Blake Sanders.Since the advent of the internet, companies have been able to create an online presence and gain exposure as part of their overall business strategy. The security of online stores, cable internet providers, corporate portals, and web-based account management are but the tip of a very complex iceberg. This has made hackers a very worrisome threat, and the advent of cloud computing only makes the logistics of keeping a business protected more difficult than ever before.

High-profile Cyber Attacks in 2011

So far this year, there have been a long series of high profile attacks. Just the ‘hacktivist’ collective known as Anonymous alone has taken responsibility for attacks that took down websites and services for Master Card, Paypal, the Recording Industry Association of America and even government websites for the CIA and the Lybian government. LulzSec, another hacking group related to Anonymous, brought down the Sony Playstation network for weeks an…

How to Plan, Create and Implement Internet Access Policy on a Network

This is a guest post by Jeremy Pullicino about how to plan, create and implement Internet Access Policy in a company.
Finding the right method to limit Internet access isn’t simple. When done properly, limiting internet access will protect the company from users hogging bandwidth, productivity loss due to cyber-slacking, and security risks such as malware and virus infections. However, if you limit internet access incorrectly it will hinder productivity, reduce employee morale and introduce new security risks to your network.

In this article I will outline the major steps a system administrator needs to take when limiting Internet access in his company.

Step 1: Implement Internet access monitoring.

The first thing you need to do when you want to limit Internet access is to understand how the Internet is being used by your employees. When you monitor Internet access you should be looking out for the following metrics:

- The sites users are browsing.

- How much time they are spending…