Tech Alert Briefing for 3/23/2007
March 23, 2007
Update covering March 16 - March 22, 2007
Welcome to Tech Talk! In this week's edition of Tech Talk, BOL Guru Jeff Patterson writes about a perception that U.S. institutions choose customer service over security.
Jeff Patterson,
BOL GURUYou'll also learn:
Get the details below.
Free Secure Instant Messaging White Paper
Introducing
WebEx AIM Pro Business Edition
Osterman Research?s semi-annual tracking survey reveals that IM is found in over 93% of businesses.However, IT departments have a difficult time halting the proliferation of unsecured and unmanaged IM in their organization.
Learn more about securing IM
FREE Webcast: Trends in Commercial Credit Risk Management
Join Harland Financial Solutions for a free Webcast on Trends in Commercial Credit Risk Management. Learn about the relationship between risk and profitability, and how the proposed Basel risk-based capital rules will affect institutions of all sizes. Click here to register! Call 800-815-5592 or email moreinfo@harlandfs.com for details.
Webcast: SecureWorks talks about Managing Network Security Logs
Log files are a treasure trove of security data. Collecting, understanding and acting on this data is very difficult and time consuming. In this free Webcast look at log aggregation and monitoring, discuss what technology and resources are required and examine best practices.
Register today or formore info info@secureworks.com
Is it a choice between customer service or security?
Are U.S. financial institutions more attuned to customer friendliness and European institutions more concerned about security?That's one of the cultural differences pointed out by Paul Raines in CSOOnline.Read the full article and catch a glimpse of where banking security may be heading.
Where do most cyber attacks originate, China, Russia, or the United States?
While Chinese and Russian hackers frequently make the news, the largest number of cyber attacks originate from right here.Read the story on Silicon.com and find out what the threats are and where they are coming from.
Backup, Backup, Backup and Keep the Paper
You're backing up all your important data on a daily basis.But are you testing the backups to make sure you can recover when something goes wrong.Find out what it cost the Alaska Department of Revenue to recover when they couldn't restore from their backup tapes in SFGate.
Six Arrested After Using Data Stolen from TJX
Six people have been arrested for using credit card information from the TJX Companies data heist.CSOOnline reports that the six alleged fugitives used stolen credit card information to purchase Wal-Mart gift cards and then purchased computers, game systems and big screen televisions with the gift cards.The losses from the use of these cards are estimated at $8 million.
Bot Net Controlled PCs Increase. Are You Protected?
SecurityFocus reports that the number of computers centrally controlled in a bot net has tripled in the past two weeks. Nearly 1.2 million computers are infected members of a bot net.Make sure your anti-virus and anti-spyware software is up to date.
Risk of Data Loss is Greater from the Caretaker, than the Hacker
According to one university professor, you're much more likely to have your personal identity information lost by corporate America than stolen by hackers.The report referenced in InformationWeek suggests that businesses in the U.S. are losing 6 million electronic identity records a month.Are you protecting your customer records adequately?
Two Must-Read Documents for the Security Professional
SANS has two new papers every security professional should read:Web Application Auditing Over Lunch discusses the basics of testing the security of in-house web applications and CyberLaw 101:A Primer on U. S. Laws Related to Honeypot Deployments discusses how to properly deploy a decoy server designed to fool and catch hackers.
US-CERT Vulnerability Summary
The US-CERT Vulnerability Summary for the Week of March 12, 2007 lists fifty-six High, nineteen Medium and thirty-four Low severity vulnerabilities.Many of the reported vulnerabilities were from Apple's massive patch release and the Month of PHP Bugs.Additional flaws were found in DLINK's TFTP Server, Macromedia Shockwave, Oracle 10g, OpenBSD, Computer Associates eTrust Admin, MySQL and the Linux Kernel.
Subscribe to Tech Talk and BOL Tech Advisories.
CD ROM Training & Information Security Supplies
CD ROM Training
CD ROM Training
CD ROM TrainingPolicies/Job Descriptions & Related Sites
Information Technology Specialist
Information Systems Security PolicyArchived Technology and eBanking You have access to previous Tech Talk pages and Tech Alerts on BankersOnline's Technology & eBanking page.