|
It is not the answer that enlightens, but the question.
Eugene Ionesco (1912-1994); Romanian-French dramatist.
- Weekly summary -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)
Madrid, April 3, 2004 - This week, Oxygen3 24h-365d has focused on the news
summarized below, which can be accessed at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp
- Cisco warns that code for exploiting vulnerabilities has been released
(03/29/04).
Cisco has reported that code for exploiting several vulnerabilities that
affect its products has been published. All of the vulnerabilities, except
the Cisco 675 Web Administration Denial of Service Vulnerability, have
already been fixed by Cisco. Therefore, all users of these devices are
advised to update them as soon as possible. Cisco is currently researching
the vulnerability that has not yet been fixed and will shortly release the
corresponding solution.
- Mobile devices and security in corporate networks (03/30/04).
New generation cell phones, PDAs or laptop computers are the mobile devices
most commonly used by corporate network users. Even though their advantages
speak for themselves, they also pose potential risks -theft, gateways for
viruses and intruders, etc.- to companies whose security policies do not
contemplate the configuration and protection systems of these devices.
- Beta version of Windows XP Service Pack 2 (03/31/04).
Microsoft has published a beta version of Windows XP Service Pack 2 (SP2)
for IT professionals to evaluate. This version of SP2 includes all of the
security updates released to date, as well as new functionalities. These new
functionalities include pop-up blocking, an enhanced firewall, which will be
turned on by default, and a center that provides information and protection
against the most common problems.
- Web-managed antivirus solutions (04/01/04).
Controlling the antivirus protection installed on laptop computers, which
are not permanently connected to a corporate network, is a serious problem
that network administrators need to solve. In fact, when these devices
connect to external networks they are not protected by the perimeter
protection installed in the local network and cannot be controlled by
systems administrators. However, nowadays there is a way of getting around
this obstacle that up until now has made administrators' jobs difficult.
Advanced technologies are now available that can be managed via the
Internet, allowing administrators to remotely control and monitor antivirus
solutions, even if the laptop is connected to the Internet on the other side
of the world.
- Human error and security breaches (04/02/04).
According to the second annual study carried out by Computing Technology
Industry Association (CompTIA), which is also reported in The Register, the
majority of security breaches stem from human error. Over the last six
months, 58 percent of those surveyed have suffered at least one major IT
security breach. This is a significant increase compared to last year's
study, when this figure was 38 percent. Furthermore, 84 percent of the
organizations polled blame human error either wholly or in part for their
last major security breach. Last year, 63 percent of those surveyed cited
human error.
NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
|
|
|
|
Posted on Sunday, 04 April 2004 @ 12:49:24 EDT by phoenix22
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 0
Votes: 0
|
|
|