Be wary of data security, companies warned

By Jennifer E. Bagalawis, Computerworld Philippines |  Security

"In the country, attacks by Filipino hackers against local Web sites will increase," predicted Bituin. "There will be more cases of Web site defacement wherein the company's Web home page will either be splashed with graffiti-like announcements or redirected to another site, usually that of a competitor."

He said the growing popularity of computer schools has also brought about a great number of technology enthusiasts who are all willing to experiment in the outside world with the tools they got from the World Wide Web.

"Viruses are still going to hog the limelight for years to come since they have been the most potent, destructive and effective means to deploy search-and-destroy as well as Trojan programs," said Dela Cruz.

Conorich pointed out that companies tend to overlook virus attacks altogether. "Most companies feel they have done what they need to do for virus detection and prevention. Unfortunately, these same companies are the hardest hit."

He emphasized that virus or malicious code education is as important as prevention and detection methods. "Users need to be trained in how to recognize executable attachments, questioning why they got one, and to save them to disk before opening them."

TIGHTEN KEY AREAS

So what will it take to secure the digital landscape? What areas should companies strengthen to keep them protected against these security threats?

What you must do, according to security experts

Albert P. de la Cruz, president and CEO, Wolfpac Communications Inc. says:

1) Improve your security policy. If you have none, then create one.

2) Re-study your IT infrastructure. If you plan to go online or do electronic transactions over the Net, make sure you have sufficient safeguards in place.

3) Do a security audit now. You may already have a breach in progress or you may have applications, operating systems or devices that have flawed software and may require a patch.

4) Invest in the basic security solutions such as IDS and antivirus software.

5) Determine the common mistakes that could lead to virus infections or security compromise and educate your people.

Jeffery Sy, country manager of Trend Micro Inc., says:

1) Perform detailed analysis for vulnerabilities and weaknesses.

2) Apply counter-measures in insecure areas.

3) Create and implement corporate security policies and processes.

4) Deploy, manage and support security enforcement systems in place.

5) Continue to make users within the organization aware of the importance of security, to achieve success in security deployment.

Douglas G. Conorich, Global Solutions manager, Managed Security Services, IBM Global Services, says:

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question