January 09, 2001, 3:14 PM — Small and midsize companies are likely targets for Internet attacks, and many will suffer a successful attack between now and 2003, according to a report released last week by Stamford, Conn., market research firm Gartner Group.
The report said more than half of the firms that manage their network security and use the 'Net for more than e-mail will be hit. It also said more than 60% of targeted firms will be unaware of the attacks, which are likely to include Web site hacking and the spread of viruses.
Small and midsize firms are especially vulnerable to malicious attacks because they usually do not have personnel with security experience. As a result, part-time employees or personnel with less than top-notch qualifications often manage key corporate servers, Gartner said.
Moreover, small and midsize firms often use regional ISPs that provide unknown levels of security, which puts them at a greater risk of an attack.
Gartner recommends four steps to strengthen network security:
Security checkups: Small and midsize firms connected to the Internet should consider contracting with a security firm to conduct an audit and risk assessment of their networks. The effort should include an internal network security audit and an external penetration test. That should take place whenever a small and midsize company makes major changes to its Web site or firewall, and at a minimum of once per year.
Firewall configuration: Ensuring that a proper firewall is installed is crucial. These firms should focus on firewall appliances that provide a base level of security without requiring detailed security knowledge. Small and midsize firms should request quotes for managed firewall and intrusion detection services from ISPs. Those types of services usually cost less than the equivalent salary of a half-time firewall administrator.
Boundary services: Scanning incoming e-mail for viruses is crucial. Small and midsize companies can use desktop or server-side antiviral protection. The companies should take immediate action to disallow relay and halt the entry of spam into their environments.
Consolidated remote access with strong authentication: Small and midsize firm that provide dial-up access to e-mail and other corporate systems should eliminate desktop modems and use consolidated modem pools and remote access servers. They should require the use of hardware tokens to authenticate remote users.