As businesses of all sizes increasingly use cloud storage and services and incorporate the Bring Your Own Device (BYOD) approach to employee management, malware and spyware are growing threats that can financially cripple or destroy a business. While it is important to understand the true costs of these attacks on a business, it is best to start with an explanation of the difference between malware and spyware and approaches to removing them.
What are Malware & Spyware?
Malware, which is short for “malicious software”, is designed to infiltrate and damage a computer without your consent. Malware includes computer viruses, worms, Trojan horses, scareware and more. It can be present on websites and emails or hidden in downloadable files, photos, videos, freeware or shareware.
Spyware focuses on surreptitiously collecting information about your usage through approaches like key logging to record your keystrokes. Spyware usually doesn’t self-replicate like other forms of malware. However, like other forms of malware, spyware can cause just as much harm to a computer, a network and a business. This can have dire financial implications for a business if the spyware is able to access the business’s or its customers’ financial data.
Prevention & Removal More...
Security is a growing concern for many businesses. With the number and scope of cyber attacks increasing every year, companies and organizations need to be aware of the different threats that face them, how to spot suspicious activity, and what to expect when a security incident occurs.
Malware and spyware are two terms often used when discussing cyber security. Although they are often used interchangeably, they actually carry different meanings. Malware and spyware are among the most common attacks that a company will experience, thus it is important to understand their differences and similarities.
Generally speaking, “malware” is a generic term for any piece of software that has negative or malicious intentions. Examples of malware include, but are not limited to, viruses, remote access tools (RATs), and trojans. Each of these types of software are used for specific purposes and carry different sets of consequences and threats. These applications can be used to control a victim’s computer, destroy software (and in some cases hardware), and even install other pieces of software without the victim’s knowledge. Thus, malware can be devastating in both personal and corporate contexts. More...
Internet Security has become an umbrella term encompassing everything from intrusion detection and antivirus to internet usage monitoring and filtering. This article discusses key concepts around the topic of Internet filtering and, more specifically, Web Filtering.
Leading Internet monitoring and filtering software solutions offer a combination of employee Internet management capabilities. Web Filtering is the method of blocking Web page access based on content classification techniques. Web Filtering is typically done either by contextual word analysis, flesh tone analysis, maintenance of a database of categorized Web sites or a combination of all three. Checking the context in which a word is used (e.g. sex as a verb versus sex as an adjective) and flesh tone analysis - looking for images that have flesh colors and thus a higher probability of nudity - provide the greatest incidence of false positives and thus tend to over-filter or over-block. More...
Last year Senator Grassley launched a probe to investigate reports that the National Science Foundation violated federal laws by approving use of taxpayer money for “unallowable expenses,” including alcohol, lobbying and extravagant parties.
A few years prior, the same Senator Grassley had his sights set on the NSF after hearing reports of the inordinate amount of employee time spent on explicit Internet activity. Reports indicate that one NSF senior official was discovered to have spent 20 percent of his day “viewing sexually explicit images and engaging in sexually explicit online ‘chats’ with various women.” Another employee was reported as having video chats to enable his on-the-job sexting. The NSF has since implemented Web Filtering software. More...
An online scammer recently tried to dupe the daughter of a Pearl
Software employee. The scammer was double-crossed, revealing his true
country of origin, source IP and ISP. The FBI is now involved.
For many small businesses, the lure of selling end-of-the-year
inventory on eBay or Craigslist is tempting. The problem is that these
sites can be littered with scammers looking for unprotected sellers that
are not highly cautious during the holiday season. What follows are a
few of the biggest scams that can cost businesses serious money and
A scam that often occurs during the holidays is
fake buyers who will complete the purchasing process through PayPal for
items from a small business. Once the honest seller sends the item, the
scamming buyer files a dispute or chargeback with PayPal saying that he
or she never received the merchandise. This is dangerous because, in
most instances, PayPal will side with the buyer if the seller has failed
to take precautions. More...
It is strongly recommended that an Internet Acceptable Use Policy be
developed and communicated to all employees when an organization begins
using an Internet monitoring or web filtering product.
New Jersey Supreme Court issued an opinion in Stengart v. Loving Care
Agency, Inc. considering whether an employee had a reasonable
expectation of privacy in emails she exchanged with her attorney via her
web-based personal email account using a company laptop. In concluding
that the former employee did have an expectation of privacy, the Court
analyzed the adequacy of the notice provided by the company's electronic
communications policy and the important public policy concerns raised
by the attorney-client privilege. More...
Terminating an employee for poor performance or misconduct is not
simple. If inappropriate employee Internet usage supports your decision
to remove an individual, it is important that you dot your “I’s” and
cross your “T’s”. The more documentation you have supporting Internet
usage, the more likely you will be to prevail should an ex-employee file
a wrongful termination suit against your company. More...
Tougher legislation aimed at protecting copyrighted materials is driving
illegal file sharing underground and causing users to unlawfully
'Piggy-back' off wireless networks in order to download content
anonymously, leaving businesses open to bandwidth abuse and theft. Many
businesses have set up loosely secured hotspots for visitors or for
convenience. Illegal access by outsiders may cause businesses new
headaches as illegal file sharing is traced back to the point of access.
is precedence, however, that may help businesses that get ensnared in
this situation. In 2005, a 40 year old Florida man was arrested and
charged with a felony for stealing bandwidth from a nearby WiFi
connection. The man was charged under a seldom used-Florida law that
prohibits accessing a computer or network knowingly, willfully and
without authorization. The owner of the WiFi connection was concerned he
might be linked to whatever the accused was doing such as accessing
porn sites or child pornography.
A comprehensive reporting module is a “must have” with any employee
Internet management solution. The reporting module’s purpose is to
synthesize raw data and turn it into information that can be easily
understood and used by MANAGERS to manage their employees. The amount of
time and labor cost a user spends at sports related Web sites is an
example of an informative report. The number of violations to your
organization’s Internet Acceptable Use Policy is another. Reports should
provide information graphically and numerically and should be able to
be scheduled to be run and distributed automatically. Advanced features
like report customization and distributed reporting can also be
beneficial. In large or growing organizations you may want to have
managers run their own reports however you may want to limit you
manager’s visibility to data of only those employees for which they are