We wish all our readers a happy new Year, all the best for 2007 and please stay with us! :-)
And if you're still looking for a good intent, then be an active part of our blog!
With the best regards
Urs
We wish all our readers a happy new Year, all the best for 2007 and please stay with us! :-)
And if you're still looking for a good intent, then be an active part of our blog!
With the best regards
Urs
A recent survey of the IT departments in 461 U.S. organizations conducted by the Ponemon Institute reported that the average annual cost of managing insider threats to data security is $3.4 million per organization. Further, more than 78 percent of respondents reported one or more unreported insider-related security breaches within their company.
http://www.law.com/jsp/article.jsp?id=1167300410341
Urs
See the TechEd/IT Forum security sessions online (Referenz: Michael Howard):
http://blogs.msdn.com/michael_howard/archive/2006/12/21/online-security-sessions-from-teched-it-forum-available.aspx
Urs
"Botnets are really where it's at for serious cybercriminals, because of their concentrated power," said Kornblum, a senior attorney with Microsoft Corp.'s Internet Safety Enforcement team. "That power can be used for all sorts of malicious conduct on the Internet."
See the article on Computerworld:
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9006818&source=rss_topic82
Urs
The Microsoft® Windows Vista™ operating system and the Windows® XP operating system with Service Pack 2 (SP2) include a variety of technologies that communicate with the Internet to provide increased ease of use and functionality. Browser and e-mail technologies are obvious examples, but there are also technologies such as automatic updating that help users obtain the latest software and product information, including bug fixes and security patches. These technologies provide many benefits, but they also involve communication with Internet sites, which administrators might want to control.
These white papers for Windows Vista (Mn_Vista.doc) and Windows XP with SP2 (Mn_XPSP2.doc) provide information on the communication that flows between operating system features and sites on the Internet. The white papers also describe steps to take to limit, control, or prevent that communication in an organization with many users. The white papers are designed to assist you, the administrator, in planning strategies for deploying and maintaining these Windows operating systems in a way that helps to provide an appropriate level of security and privacy for your organization’s networked assets.
Urs