Discussion on enterprise network security

Source: Internet
Author: User

Compared to the past, corporate security has become more and more powerful-installing more products or implementing more strategies. Despite the high security awareness and the use of cutting-edge tools, 2006 remains the worst year for corporate security leaks – and security risks continue to expand. The problem is that the attackers and defenders are making progress together-and that attacks do not always take place where people expect them to.

Insiders are

for an organization, in fact, the biggest threat comes from within. In the 2006 Information Security Leak survey, DTI and PricewaterhouseCoopers found that 32% of the information attacks were caused by internal employees, while 28% were from former employees and partners.

Similarly, according to U.S. and European law enforcement experts, more than 50% of security leaks are due to abuse of access by employees, whether intentionally or unintentionally. Therefore, the protection of enterprise security is not only to prevent external threats. People should also pay attention to the threat from unfortunate or dangerous employees.

An important threat to the enterprise is spyware, often because the employee simply clicks on a series of pop-up browser windows or installs the unauthorized "cool" software from the network, and spyware is unconsciously introduced into the company. Rumors about spyware do not obscure the fact.

Smash Rumors

There are 6 misconceptions about spyware:

1. Spyware is an isolated problem.

2. Intercepting spyware at the gateway is sufficient.

3. The computer is "locked" on the line

4. The main source of security breakthroughs is "passing" Downloads

5. The problem is from the outside

6. No one wants spyware

But the fact is that it's quite different from the above view. Let's look at the real situation hidden under these false positives.

1. Most spyware is introduced as a result of improper operation of the user, whether intentionally or unintentionally.

2. The staff is on the computer all day. It is not safe to block the gateway and not protect the PC. It was like blocking the door and window of the house-but the thief stayed in the basement-and didn't call the police. In addition, gateway defenses cannot detect existing threats on the computer.

3. If "lock" the computer and limit the user to install the software effective, people also do not need to use anti-virus software. Spyware is designed to circumvent the usage strategy and to exploit the user's curious nature.

4. "Passing-through downloads" should not be allowed in an enterprise environment, as they come from those sites that employees should not browse during their working hours.

5. Of course, spyware comes from the outside--some people open the door to let them in. If you don't realize this, the security system will be riddled with holes.

6. Indeed, no one really wants spyware, but they usually come with applications that users really want. So spyware is still installed on the computer anyway.

Spy Traps

So what should companies do to minimize internal threats?

First of all, the establishment of network security necessary for the Web site filtering device. This will prevent users from accessing the familiar spyware and "pass-by downloads" sites.

Second, configure a valid e-mail filtering device that prevents spyware from entering the network through active HTML, attachments, phishing software, or spam. The company also needs to set up protective measures on the desktop to block spyware that has been introduced.

Finally, a scheme is introduced to prevent employees from running or installing spyware-installing programs.

Simply put, in order for thieves to stay away, organizations should first eliminate the possibility of an employee introducing thieves into the home. They have to implement programs that make it easy for users to evade-regardless of how the external causes are induced.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.