|
|
Data Recovery - What Not to Do!
Data Recovery - What Not to Do!
by Keith Thompson
Data recovery is a tricky thing, and if you've somehow
deleted or had your important files corrupted or lost due to
human error, business espionage, faulty hardware or software
or any...
Hackers Given Access to IRS Computers?
The Treasury Department inspector general has reported a distinct weakness in the security surrounding the IRS computer systems. Unlike the problems found with other security systems, this one is human. The Treasury Department inspector general...
Linux or Windows - Which is it?
Computer users and programmers have become so accustomed to
using Windows, even for the changing capabilities and the
appearances of the graphical interface of the versions,
therefore it has remained Microsoft's product. Although,
Lycoris, Red...
Outsourcing: Multiplying It Services
As global competition intensifies and heats ups, an increasingly large number of firms have begun to compete and challenge big computer business giants i.e. Electronic Data Systems (EDS) and IBM with low cost products, sophisticated technology,...
Top 10 Ways To Protect Yourself From Computer Viruses
As more and more people are becoming comfortable using their computers at school, home or in the office it's only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.
Use a high...
|
|
|
|
|
|
|
|
Information Security for SMEs
This article explores computer security, aiming to give businesses an insight into why they must be proactive in protecting their systems. There are many aspects to security on the Internet and a lot has been made recently of the security of e-commerce transactions. Whilst many of the security issues that a website administrator faces are similar to those that your businesses computers are threatened with, this column will concentrate on how and why you should secure your internal IT investment.
The Internet in its current state is similar to a city with no locks on the doors of its houses, where computers can be thought of as houses and the networks making up the Internet, the city streets. Computers as they are sold today are inherently insecure, allowing access to anyone with a bit of curiosity or malicious intent. As businesses come to rely more and more on electronic information (not least e-mail), the potential disruption caused by a data burglary, informational arson attack or digital graffiti has reached a level that businesses should not ignore
The threat Any computer on the Internet exposes a series of ports through which information flows. By default these are all open and unlocked. Whilst many of them may lead to empty rooms or brick walls, an attacker will only need to find one port vulnerable to attack for the whole system to be compromised.
Even if your ports are secure; intruders can get into your computer in a Trojan horse. A piece of software disguised as something useful can contain a malicious sub-program to install a backdoor into your system. Often these programs claim to give something for free or display small games whilst an attacker has a good nose around
One of the most worrying developments has been the proliferation of automated attacks. These can be run from an attacker's computer, scanning hundreds or thousands of computers in a day; or can be the self-replicating Internet worm. These are a hybrid of virus programs and computer security attacks. In worst-case scenarios, they can bring whole segments of the Internet to a standstill.
Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accounts the day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer do the job for which they were intended.
When we drive a car we are accepting and using a set of standards that have evolved since the turn of the century to ensure safety, convenience and fair access for all users of the road system. Some of these standards are globally accepted (for instance a road is made from tarmac and wheels are made from rubber) whilst others vary from country to country (for example if we drive on the left or the right). The practical upshot of these standards is that a car designed and built for use in one country can be safely used in another (possibly with a little bit of inconvenience).
The aftermath Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accounts the day before your filing date), data that has been altered in subtle ways
(imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer do the job for which they were intended.
Almost worse than losing all your data (because we know you keep a regular backup), is having your system infected with a worm program. In some cases this can leave your computer unknowingly sending an attack the way of all your contacts. Alternatively, your computer could be under the complete control of a third-party, who is using your processor, memory and hard-disk for their own purposes.
What can I do to stop it? Just as it is not the councils responsibility to stop burglars coming down your street, in the UK there is very little responsibility on ISPs to prevent attacks. If your systems are not locked (with firewall software), alarmed (with an intrusion detection system) and insured (by taking a daily backup) you have no-one to blame but yourself.
There are three pieces of software that every business needs to at least consider. I cannot over-emphasise the need for an up-to-date virus scanning program. Most reputable products will scan for and remove some Internet worms and some Trojan horses; however they will not detect other types of attack. For those attacks a good firewall package is essential. Installing one of these programs is akin to fitting locks to your doors and windows. Finally an intrusion detection system (IDS) is similar to an alarm system, warning you of a potential attack.
In my opinion all businesses should have a solid anti-virus policy as well as a good firewall. Whichever solution you choose at the end of the day, you must fully understand its capabilities or it will be as effective as not having anything at all.
Keep an eye on patches Most electronic attacks exploit a mistake in the program code of the software you use. Responsible software vendors will issue a 'patch' that resolves each issue as soon as it is brought to their attention. You will find that many software companies have e-mail lists that you can subscribe to in order to be notified of new problems and patches.
This patching mechanism makes up the software industry's response to the hacker community. If you are applying your patches diligently, the security of your computer systems depend on how far ahead either side is. It is therefore good practice to have a complete security audit of your systems by an external consultant twice a year or more often if you rely heavily on your data.
It won't happen to me Your business network is constantly being probed by hackers on the Internet looking for ways into your data. Most attacks occur without the user even knowing that a system is compromised. Our systems at FWOSS get probed three or four times a week, so our firewall is invaluable in ensuring they get no further.
What can I do in the case of an attack? Of course your regular backup provides your ultimate safety-net, but as the effects of different electronic attacks are so varied there are no hard and fast rules to recovery.
It is very much a case of prevention being better than cure; therefore you should think about installing an anti-virus program, firewall and intrusion detection system. You should keep a daily backup; check if your systems need patching weekly; and have a security audit bi-annually or more frequently.
About the Author
Thom is the operations director for Fire Without Smoke Software (FWOSS) ltd.
|
|
|
|
|
Data Recovery Software and Undelete from R-TT |
Disk management software including utilities for data recovery, drive imaging, disk wiping and access control. |
www.r-tt.com |
  |
Data Recovery | Email Data Recovery by Ontrack |
Data recovery services, data recovery software, file repair software, and diagnostic software from Ontrack. Software for email recovery, file recovery and ... |
www.ontrack.com |
  |
Data Recovery by DriveSavers | Hard Drive Data Recovery |
Worldwide data recovery service for all operating systems and storage media. Authorized by all drive manufacturers. |
www.drivesavers.com |
  |
Hard Drive Data Recovery Software Tools, Disk Recovery Utilities ... |
Offers data recovery software,data recovery services for hard drive recovery and data safety software services for your computer. Buy award winning data ... |
www.stellarinfo.com |
  |
Data Recovery by FADV – Hard Drive, RAID, Tape, Database and more ... |
Offers data recovery services for all hard drive models. RAID, MS SQL, Exchange, Tapes, Camera and USB media, CD and DVD. Service available 24/7. |
www.datarecovery.net |
  |
Data Recovery Software - File System Utilities |
Data recovery software for all Windows file systems. Recover deleted files, corrupted hard drives, and partitions. |
www.runtime.org |
  |
Professional Data Recovery Software from Bitmart. File Recovery ... |
Data Recovery Software Restorer2000. Undelete & File Recovery utility for FAT and NTFS file systems. Data Recovery from damaged disks and partitions. |
www.bitmart.net |
  |
Data Recovery Services - ActionFront - Critical Server Data Recovery |
ISO certified data recovery services with labs in Atlanta, Santa Clara, Dallas, Chicago, Toronto (also Buffalo and Tokyo Japan) |
www.actionfront.com |
  |
Hard Drive Data Recovery Software: Recover Deleted Files- Recover ... |
Data recovery software for recovering files that have been deleted or lost due to the hard drive format, virus infection, unexpected system shutdown or ... |
www.recovermyfiles.com |
  |
Data Recovery Group - Hard Drive Data Recovery Services |
Data Recovery is Our Only Business! Data Recovery Group's a complete data recovery service that specializes in recovering data from hard disk drives. |
www.datarecoverygroup.com |
  |
Data Recovery by CBL: Hard Drive Recovery Services |
Worldwide Data Recovery Services at CBL. Specializing in data recovery, hard drive recovery, hard disk drive recovery and RAID data recovery. |
www.cbltech.com |
  |
Data Recovery Software, File Repair Utilities, Hard Disk Recovery ... |
Hard drive data recovery software to perform data recovery & recover deleted files from Novell, Linux, Unix, Mac, Windows & data recovery services for hard ... |
www.nucleustechnologies.com |
  |
AT&DR: Data Recovery and Liabillity |
Associated Technologies offers complete data recovery solutions with services for any type of data storage device, including the following: hard drives, ... |
www.datarecovery.com |
  |
Ontrack UK - Data recovery services & recovery software - hard ... |
Ontrack offers data recovery services & software for: hard drive recovery, file recovery, server recovery, email recovery, tape recovery, RAID recovery. |
www.ontrack.co.uk |
  |
Beginners Guides: Hard Drive Data Recovery - PCSTATS.com |
Beginners Guides: Hard Drive Data Recovery - PCSTATS.com. |
www.pcstats.com |
  |
File Recovery and Data Recovery Software. Hard Drive recovery utility |
Data recovery software for FAT, NTFS, Ext2FS file systems. File recovery after FDISK, MBR destruction, FAT damaged, virus infection. Dynamic disk support. |
www.data-recovery-software.net |
  |
Data recovery - Wikipedia, the free encyclopedia |
Data recovery is the process of salvaging data from damaged, failed, ... Although there is some confusion as to the term, data recovery can also be the ... |
en.wikipedia.org |
  |
Active@ UNDELETE Data Recovery. Recover Deleted Files. Windows XP ... |
Active@ UNDELETE - Data Recovery Software for all Windows File Systems. Recover deleted files from lost, damaged, formatted or reformatted partitions. |
www.active-undelete.com |
  |
New Zealand Data Recovery & Computer Forensics Experts |
New Zealand data recovery specialists & computer forensics investigation experts. Recovering lost data for businesses or legal evidence is all we do. |
www.datarecovery.co.nz |
  |
Canada Data Recovery Services: Hard Disk Drive Recovery, Raid Data ... |
Provides data recovery solutions for companies experiencing data loss from failed hard drives, raid arrays, and server systems. |
www.datarecovery.ca |
  |
|