Home arrow Site Administration arrow Page 3 - So You Survived the Disaster. Did Your Company?

Virus and Hacker Protection - Administration

The 2001 attacks in New York and Washington have hopefully placed the importance of “Business Continuity” plans and processes in the forefront of everyone’s mind. Of course, Business Continuity is a new enough term that you may not know what that is. In short, it is a plan that will provide “continuity” of your business in the event of a disaster.

TABLE OF CONTENTS:
  1. So You Survived the Disaster. Did Your Company?
  2. Still, This Is Not Enough
  3. Virus and Hacker
  4. The Business Continuity Table of Contents
  5. Putting It Together
By: Danny Wall
Rating: starstarstarstarstar / 4
November 22, 2004

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

Virus Protection

While most companies have virus scanners in place, few truly stay on top of keeping their virus signature files updated. Few really stay on top of the CERT (Computer Emergency Response Team), something easily done by going to www.cert.org.

A truly robust virus policy includes not only making sure that a scanner is on every computer that attaches to your local area network (no matter how that attachment happens), but also includes checking for new virus signature files from your virus protection vendor daily. It also includes a daily scan of the newsgroups on the subject of viruses and keeping up to date with the CERT advisories.

To tie this item together with the one above, this means having a specific virus scan, with your virus software, performed on your reciprocal partners’ computers. It also means trying this process in with your total disaster restoration plan.

Hacker Protection

This is a tricky one. Most companies have some sort of firewall to protect themselves from hackers that are coming from outside the company. The only problem is that there are now so many different types of attacks that merely putting a firewall in place is no longer enough. Additionally, most unauthorized accesses to you systems will not come from outside your company, it will be unauthorized access from your employees.

Entire books have been written on this subject, so I’m not going to go into it here in great depth. But even supposing you are keeping up on the latest security measures, you still need to ensure that you are keeping up with the CERT advisories (www.cert.org), monitoring alt.2600 (and it’s sub newsgroups) and that you are a part of the user groups for all of your hardware mission critical software. This will ensure that you stay on top of any new security holes being exploited.

Having Enough Protection

There is a final problem with most companies. The above three policies are virtually always created independently of one another. The plans exist, but they are separate plans, with documentation in separate places, and often with separate people overseeing each item.

Think of it this way: you have a backup and restoration policy to prevent the loss of your company’s data. You also have a virus policy to prevent the loss or corruption of your company’s data. And you have Hacker policies to prevent the loss (and unauthorized use) of your company’s data.

Anyone see a pattern here?

All three of them are created to prevent the loss, corruption, or improper use of your data, so they should be created together, and managed together. In short, they should be part of a unified “Business Continuity” document. Essentially, this document explains, in minute detail, all of the processes in the event of a disaster. In this case, disaster means anything that prevents you from getting at whatever data that is needed, when it is needed: a virus hits even one computer on your network, an accidental file deletion, a hacker breaks through your security system, a hurricane causes the collapse of every building in your campus, or anything else that prevents you from doing business exactly when it needs to be done.

Getting something comprehensive like this setup can be time-intensive. However, once it is in place much of the maintenance can be automated. That only leaves a little necessary hand-holding to keep the reciprocal agreement I had talked about earlier in tact. If done properly, this can be an enjoyable break from the daily grind. I would like to say now that a specialist in this area should oversee the creation of the systems and processes. If this specialist knows what they are doing, they will have created the following document as the final deliverable when work is completed.



 
 
>>> More Site Administration Articles          >>> More By Danny Wall
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SITE ADMINISTRATION ARTICLES

- Coding: Not Just for Developers
- To Support or Not Support IE?
- Administration: Networking OSX and Win 7
- DotNetNuke Gets Social
- Integrating MailChimp with Joomla: Creating ...
- Integrating MailChimp with Joomla: List Mana...
- Integrating MailChimp with Joomla: Building ...
- Integrating MailChimp with Joomla
- More Top WordPress Plugins for Social Media
- Optimizing Security: SSH Public Key Authenti...
- Patches and Rejects in Software Configuratio...
- Configuring a CVS Server
- Managing Code and Teams for Cross-Platform S...
- Software Configuration Management
- Back Up a Joomla Site with Akeeba Backup

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: