YOUR BUSINESS AUTHORITY

Springfield, MO

Log in Subscribe

Cybercrime: Springfield-based Internet service providers give tips for online security

Posted online

|tab|

Cybercrimes such as the recent Love Bug attack are a hot topic for lawmakers and, more personally, for the computer users whose systems and data may be at risk from viruses.|ret||ret||tab|

A recent conference attended by judges, police, diplomats and representatives of high-tech firms from the G8 nations United States, Japan, Germany, Britain, France, Italy, Canada and Russia addressed cybercrime. |ret||ret||tab|

French Interior Minister Jean-Pierre Chevenement called for a worldwide agreement that would guide countries in punishing hackers and other cybercriminals. |ret||ret||tab|

World leaders say a global agreement is important because the Internet knows no national boundaries.|ret||ret||tab|

Closer to home, what can individuals and businesses do to make their computers and data secure? |ret||ret||tab|

A number of Springfield-based Internet service providers were asked this question. Here are the recommendations:|ret||ret||tab|

One of the single most important steps to take to ensure computer security is educating the employees. |ret||ret||tab|

They need to know and take all the appropriate security steps, such as using hard-to-crack passwords, not sharing passwords, not opening .exe files, not leaving documents open on the desktop, and using networks for business purposes only not trafficking with friends as in forwarding jokes or sharing disks.|ret||ret||tab|

"Humans are the easiest things to hack," said Craig Myers, Internet department manager, ProTel Systems. "The most important thing is understanding not everything takes place at the computer level. People can be lied to, cheated and tricked."|ret||ret||tab|

An example he gave was of a secretary who got a call she assumed was from the "computer guys in the basement" who told her to log out. She did. Then they told her to log in again. When she did, they got her password. Sensitive documents ended up being e-mailed to outsiders.|ret||ret||tab|

Have up-to-date anti-virus software and use it. Examples include McAfee, Dr. Solomon and Norton Antivirus.|ret||ret||tab|

A firewall is essential, particularly with the new direct satellite link and cable Internet connections which are always open. |ret||ret||tab|

"A firewall is either a piece of hardware or software that secures the traffic to and from your company. It analyzes the data and if it sees something malicious, it disregards or throws away that data," said Brendon Cummings, professional services group manager at NetWorks Inc.|ret||ret||tab|

"The most costly security item can be a firewall. It is a main point of security. Pricing on firewalls varies widely, but could be as much as $60,000, depending on the scale of the system and what it's protecting," said Thomas Rankin, systems analyst at e-guys Computer & Internet Services. He gave Cisco Systems as an example of high-end firewall units.|ret||ret||tab|

A low-end firewall as far as cost goes is Zone Alarm, at ZoneAlarm.com, which is shareware free to individuals and about $20 for businesses. |ret||ret||tab|

Use watchdogs. "Basically (the watchdog is) an early alarm of someone poking around in a directory. Usually the computer guy on the site has to custom craft watchdogs," Myers said.|ret||ret||tab|

Encryption is useful for sensitive information and is an important consideration in particular if you are using a direct satellite connection. |ret||ret||tab|

Information can be picked out of the airwaves just as has been done with cellular phones.|ret||ret||tab|

Use common sense when downloading files from the Internet. |ret||ret||tab|

"Don't ever put anything on your computer that you aren't sure of," said Paul Kelly, general manager at Panther Creek Information Systems.|ret||ret||tab|

"Stopping the I Love You bug was a simple matter of not opening attachments," Kelly said. "Education is 99 percent of the problem. Don't do things that you shouldn't do. It's fundamental: look both ways before you cross the street." |ret||ret||tab|

"Be prepared," Rankin said. "Set up enough security so that hopefully something won't happen."|ret||ret||tab|

If it does happen, have a plan in place so you know what to do, Myers said. |ret||ret||tab|

For instance, what would you do and who would you tell if the payroll records got out?|ret||ret||tab|

"Don't depend on AOL and the big boys to protect you; depend on yourself more than your service," said Rick Thomson, president, Ozark Network Communications Inc.|ret||ret||tab|

"We protect our Web sites from outside interests. Our job is to make sure the servers are safe. But no one can say they are 100 percent protected. All you can do is Band-Aid," Thomson said. "Hackers have nothing better to do than to try to find their way into your system."|ret||ret||tab|

Meyers said enjoyment is a motivator of hackers. "Generally hackers are out for the thrill of it. There are few ninja or mercenary hackers out there. Most of it is recreational for teens, disgruntled employees or someone who wants to make the headlines," Myers said.|ret||ret||tab|

"The Internet is still the wild, wild West," Cummings said. |ret||ret||tab|

[[In-content Ad]]

Comments

No comments on this story |
Please log in to add your comment
Editors' Pick
Hammons pact raises questions over Highway 60 plan

40-year-old document among considerations in roadway initiative.

Most Read
Update cookies preferences