How To Understand The Concerns Of Home Based Small Business Owners About The Internet Security
|
|
- Laurence Fletcher
- 3 years ago
- Views:
Transcription
1 Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive? David W. Johnson Dept. of Information Systems & Technology Utah Valley State Harold Koch Department of Marketing Utah Valley State Abstract This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-based survey was administered to measure attitudes toward specific computer security risks and the self-reported defenses taken by respondents. Analysis of the survey data shows that while home-based small business owners are highly aware of and concerned with existing threats, their level of action to guard against the threats is relatively low as is their willingness to pay for adequate protection. 1. Introduction There is a plethora of current trade and popular literature on the topic of uninvited computer security invasions in the form of identify and data theft, pornography, and spam [4,11,12,13]. Such literature is a response to the increasing level of alarm at all business and government levels regarding Internetbased threats. For example, Foster [5] estimated that by June of % of all traffic would be spam, rising from 50% in 2003 when in fact more recent data show that level to be 82% [9]. A study by Koch and Liechty [7] found that the average small to medium-sized design agency received between 100 and 300 uninvited spam messages per day, an onerous invasion that not only consumes scarce managerial time but exposes those small businesses to risk of the mentioned threats. The uniqueness of this study is that it brings the small business person, especially the home-based, up to the moment and recommends practical suggestions to the small business owner in order to prevent loss from such virtual threats. 2. The Problem Previous empirical studies prior to the networked era [1,8] found dramatic gaps between small business knowledge of computer security threat and the reality of the situation. This 2004 study probes deeply into the knowledge, apprehensions, attitudes, and opinions of 230 practicing small businesses to move this knowledge forward. As information technology has advanced, so has the threat of security problems for the small business owner. In a recent focus group conducted for the present study, all of the participants felt that the threats to their home computer systems were increasing. Data gathered by the Computer Emergency Response Team Coordination Center (CERT/CC) at Carnegie Mellon University show an exponential increase in the number of incidences over the past decade [3]. CERT notes that an incident may involve one site or hundreds (or even thousands) of sites. Also, some incidents may involve ongoing activity for long periods of time. This is not good news to the small business owner who wants to take advantage of technological advances, yet who often lacks the knowledge and expertise to deal with these threats. For example, only about 50 percent of the participants in the above mentioned computer security focus group had heard about threats such as Trojan horses or spyware. A majority of the focus group members felt that there was a 100 percent chance that their computer would be affected in the near future. Figure 1 depicts a model showing several increasingly complex levels of information technology available to the small business owner. Security issues surrounding an isolated computer system (Stand-alone PC) have been addressed previously [1,8]. Results of their research showed a moderate level of security awareness (60-70%) and a rather low level of implementation (34-45%) for the simplest of all technology levels. With the increased use of the Internet, small businesses began exposing themselves to new types of computer security threats. Although at a relatively slow speed, dial-up access provided and the ability to download files. New annoyances such as SPAM, pop-ups, and uninvited pornography required extra time on the part of small business owners to deal with extra transactions and to attempt to minimize the disruptions. In addition, deadly viruses /06/$20.00 (C) 2006 IEEE 1
2 often cost unprepared owners major efforts to rebuild lost databases and files because of a lack of backups. The availability of high-speed Internet access only acerbated the problems (Statistics show that at least of 85 percent of small businesses use the Internet [10]). In addition, new major threats began to appear. Since home computer systems were now almost always connected, hackers found new fertile ground for their mischief often undetected by the small business owner. Whether leaving Trojan horses for future damage or spyware for tracking usage, hackers began making illegal use of home computers. Even more dangerous hackers were able to access private data such as social security numbers and customer data for identity theft. More recently, wireless networks have made the connection of several computers within a small business location possible. Owners now had to contend with their employees wasting time surfing the Internet just like the big companies. In addition, the new threat of outside access to their wireless network increased. More sophisticated hackers began war driving using a van with mobile computers and wireless network detectors to break into the network and access private files. Finally, the need for small business to connect to remote computer systems at various locations has made wide-area networking (WAN) popular. Using the Internet for these connections can open transactions to hackers who constantly monitor the digital traffic. Because of the newness of wireless networking and WAN usage, it was decided to focus this paper on Internet-based threats facing home business owners. The following research questions were the drivers for our current study. 1. To what extent are home-based small business owners (HBSBO) aware of the increased threats facing their business because their computer system is connected to the Internet? 2. How serious are the Internet-based threats to HBSBO? 3. To what extent have HBSBO been affected by Internet-based threats? 4. To what extent have HBSBO taken steps to proactively counter the Internet-based threats? 5. How successful do HBSBO feel that their current security measures are? 6. How important would a comprehensive package that counters Internet-based threats be to the HBSBO? 7. What would HBSBO be willing to pay for such a comprehensive threat deterrent? 8. Are there differences in the above opinions based on various demographics such as gender, age, income, hours using PC, and geographic location? 3. Methodology A formal focus group of 12 home computer users who used the computer more than 20 hours per week was conducted to probe general knowledge of computer security problems, intentions to purchase and/or subscribe to services that would treat the noninvited intrusions, and price sensitivity to potential solutions. Four marketing research and IT managers of a large, local multinational corporation observed the focus group from the control room to ensure that the right type of questions were present on the script and suggested interventions when appropriate during the live session. Afterwards, analysis of the videotaped results provided the framework for a quantitative questionnaire that was developed for uploading as an Internet-based survey. The questionnaire consisted of 52 questions with demographic data to determine if there were a relationship between age, gender, amount of time spent on the computer per week, and geographic area. The survey was pilot-tested with five randomlyselected home-based businesses. A follow-up phone call was made to clarify wording, meaning, and usefulness of the questions. The survey was sent out to 800 randomly-selected US small home-businesses from the data base files of the sponsoring company. An message promising confidentiality and a copy of the results in exchange for their participation in the study was included. Because of the relationship with the multinational a 29 percent return was achieved, a possible source of bias which will be discussed later in this paper. 4. Analysis of the Data The 232 completed surveys were entered into SPSS (Version 12) for analysis. It was determined that the most important analytical tools were descriptive analysis; Chi-square; t-tests; and multiple regression. The following tables reflect the raw findings. Table 1 shows the population demographics. As can be seen, the survey respondents represent a broad range of home-based small business owners across a broad range on educational, income, age, and geographic categories. In the following sections, we address the research questions posed previously. 2
3 4.1 Awareness The first research question addresses the extent to which home-based small business owners (HBSBO) are aware of the increased threats facing their business because their computer system is connected to the Internet. To answer this question, we analyzed awareness responses to the items shown in Table 2. Responses to the survey categories Don t know/never heard of and Heard of but could not explain were combined under the Unaware heading. Responses to the survey category Know a little about appear under the Somewhat Aware heading, and responses to the Know quite a bit under the Aware heading. The most knowledgeable categories were Spam , Virus Attacks, and Pop-ups while the highest Unaware categories involved Trojan Horse and Spyware. The average awareness percentages were 19 percent Unaware, 37 percent Somewhat Aware, and 44 percent Aware. When the Somewhat Aware and Aware categories are combined, an upper bound on overall awareness of 81 percent is obtained. If we postulate that only about half of the Somewhat Aware group was really aware, a lower bound of 63 percent results. 4.2 Concern and Incidence of Threats Table 3 summarizes the data pertaining to research questions two (How serious are the Internet-based threats to HBSBO?) and three (To what extent have HBSBO been affected by Internet-based threats?). Threats in the table are ordered by the median of the concern rankings. Percent Extremely Concerned consisted of respondents that answered a 7 on a 7- point scale. Percent Highly Concerned includes respondents who answered 5, 6, or 7 on the 7-point scale. Virus Attacks and Identity Theft top the list as the most serious concerns. Hacker Attacks and, interestingly enough, Uninvited Pornography are next in the rankings. Spyware and Trojan Horse are in the bottom half of the list, perhaps because over 40 percent of the survey respondents were unaware of their existence. Spam and Pop-ups were the highest in the incidence column but were of least concern. Identity Theft and Hacker Attacks were lowest on the incidence level column but ranked second and third in the concern rankings. Table 4 shows the incidence of combined problem occurrences of the threats shown in Table 4. Nearly 67 percent of the respondents indicated having to deal with at least four different types of computer security threats. When asked what they felt the likelihood of being affected by a threat within the next three months, the average response was five on a seven-point scale. Only 23 percent felt that the likelihood was Extreme (7) and 44 percent felt the likelihood was high (5, 6, or 7). On the other hand, when asked about the importance of protection against Internet-based threats, the average response was 6.67 on a sevenpoint scale with 79 percent reporting Extreme (7) and 97 percent High (5, 6, or 7). 4.3 Current Security Packages and their Success We turn our attention next to the extent to which HBSBO are proactive in their attempts to protect their businesses from the Internet-based threats that they are concerned about (Research question four - To what extent have HBSBO taken steps to proactively counter the Internet-based threats?) As may be expected, 92 percent of the owners had installed some form of virus scanner; however, only 50 percent of these get the latest upgrades. Forty-four percent of the owners had installed some type of firewall, 72 percent did SPAM filtering,15 percent had web-page content filtering, 54 percent downloaded operating system patches regularly, 29 percent had pop-up blockers in place, and a mere three percent had installed spyware protection. When the Virus scanner percentage is reduced to 46 percent because respondents did not get the latest updates, the overall average percentage of respondents taking protective measures is 37 percent if Spyware is included and 43 percent if Spyware is excluded. Table 5 shows the percentage of respondents implementing multiple types of the protective measures (excluding sypware) shown in Table 4. Over 61 percent of the respondents had implemented at least three different types of security measures. Several of the respondents indicated in their comments that they avoided using Microsoft products as a protective measure, preferring instead to use a Mac or the Linux Operating System. When asked how well their current security measures were working, 14 percent indicated the Best Possible, 49 percent indicated Adequate, 19 percent Not Enough, and 17 percent Don t Know. Thus 63 percent of the respondents appeared comfortable with their security efforts while 86 percent felt that there was room for improvement. 3
4 4.4 Interest in a Comprehensive Security Service One sure way to understand the value that is placed on anything is to ascertain what someone would be willing to pay. In this section, we focus on research questions six (How important would a comprehensive package that counters Internet-based threats be to the HBSBO?), and seven (What would HBSBO be willing to pay for such a comprehensive threat deterrent?). As part of the survey, respondents were given the description of a comprehensive security service that protected them from all the Internet-based threats discussed earlier. Respondents were then asked questions about such a service. When asked to rate their interest in such a service, respondents averaged 5.93 on a 7-point interest scale. Forty-seven percent were Extremely Interested (7) and 87 percent expressed a High interest (5, 6, or 7). When asked if they would subscribe to such a service, 22 percent of the respondents indicated that they Definitely would subscribe, 43 percent indicated that they Probably would subscribe and 31 percent indicated that they May or may not subscribe. Figure 2 shows what the respondents felt that such a comprehensive security service would be worth as a monthly fee. If one uses the midpoint of the ranges to calculate an average monthly cost that respondents were willing to pay for an ideal protection service the result is a mere $ Differences by Demographic Factors In this section we explore the answer to research question eight (Are there differences in the above opinions based on various demographics such as gender, age, income, hours using PC, and geographic location?). The categories for each demographic factor are shown in Table 1. For Geographic Location: We grouped the state of the respondents business into the following four areas: East, Mid-West, South, and West. For each demographic factor we ran a series of Chi-Square tests based on questions pertaining to the areas of security awareness (A), security concerns (C), and proactive actions (P). Table 6 summarizes the results of statistically significant differences (Alpha <.10). For gender differences, more women than men had Heard of but could not explain the indicated threats while men professed to Knowing quite a bit more about all the threats than women. In addition, more women were Extremely concerned about the indicated threats. Finally, women tended to report having fewer types of security incidences than men. For the educational differences, there were no differences in awareness and only one difference in concern levels where those with professional degrees expressed a slightly higher degree of being Extremely concerned than those of lower educational levels. On the other hand, professionally degreed respondents expressed a higher degree of belief that they would be attacked by a serious problem, while those with educational levels less than a bachelor s degree reported a higher number of security incidences and a lower number of security packages utilized. For the income demographic, no differences in awareness or concern were found, however medium income businesses ($35K - $75K) expressed a higher interest in a comprehensive security package even though they reported a significantly lower level in the number of reported attacks. Finally, the number of security tools utilized by higher income owners (> $75K) was greater than all other categories. The only age difference reported involved concern about hacker attacks. Here younger aged owners (18-34) showed the lowest level of concern; middle aged owners (35-54) expressed more Extreme concern and showed the lowest in the Not concerned category. Mature aged owners (55+) expressed less Low and Extreme concern than the other age groups. Finally, for the region category, several significant differences were found, however no consistent pattern emerged to distinguish between the regions in all cases. 5. Discussion Are home-based small business owners aware and proactive when it comes to Internet-based security threats to their computers? A previous study by Bardbard et al. (1990) concluded that for stand alone systems, the first phase in our security model, survey respondents had a moderate level of awareness (60-70 percent) and a low level of implementation (34-45 percent). Some 14 years later with their computers connected to the Internet (phases two and three of our security model) survey respondents reported comparable results. The current awareness range of percent is somewhat higher than the previous study probably because of the higher level of media publicity on the subject of Internet security problems. The highest level of respondent awareness is in the areas of 4
5 SPAM, virus attacks, and pop-ups. Incidentally, these same three areas are among the four highest in reported problem incidence. The lowest levels of awareness involve Trojan horses and spyware, which again are part of the four lowest in reported problem incidences. Among the eight problem areas, the highest percentage (34.5%) of respondents reported having had problems in four different areas. The percent of those reporting at least five different problem areas was 32.1 percent. The top three areas of concern, according to the median rankings, were virus attacks, identity theft and hacker attacks. It is interesting to note that these same areas had the lowest levels of problem incidents. Also interesting to note is the fact that uninvited pornography was fourth in concern rankings yet only 15 percent of respondents indicated using a Webpage filter as a protective measure. When looking at proactive security steps taken by respondents, 92 percent indicated owning virus scanning software (virus attacks were the number one area of concern). However, of these only 50 percent reported getting the latest updates for their virus software, thus negating much of their investment in this area. Overall, an average range of percent of the respondents had taken full security measures to protect their computer systems, numbers which are very comparable to the Bardbard study. While 63 percent of the respondents felt comfortable with their current security efforts, 86 percent felt that there was room for improvement. If there were a comprehensive security package that would protect against all Internet-based threats, only 22 percent of the respondents said that they definitely would subscribe. When asked what they would be willing to pay for such a service, the average bid was only $8.55 giving us a low financial dimension to survey respondents estimates of the value of Internet-based security protection. There were differences in responses based on demographic factors. The most interesting involved gender, where females were less aware and more concerned with security threats than males, however this did not translate into more proactive responses or to their willingness to pay more for protection than males. Also of interest was the result that respondents with higher educational levels tended to be more concerned about threats and more proactive in their defenses. Those with lower levels of education reported a lower level of proactive measures and a higher level in the number of attacks than the other educational levels a not too surprising result. 6. Limitations and Suggestions for Future Study The data for this study was collected as part of a market research survey for a large western corporation. As such, the researchers were limited to those questions which the company wanted on the survey. The fact that the respondents were all homebased distributors also limits the generalization of the study results. In addition, since the survey was administered via the Internet, the results may also be biased toward those types of individuals willing to participate in such a survey. Finally, according to government definitions, home-based businesses are not considered in the small business category by definition, thus the study results do not necessarily reflect the thoughts and actions of all small businesses. Nevertheless, the study does contain a broad geographic representation of home-based business owners who struggle with Internet security issues on a regular basis. The data collected as part of this study constitutes a rich knowledge-base of the attitudes and opinions of home-based business owners regarding Internet security. This paper has reported on one set of research questions in this area. Other questions and data analysis are possible beyond those reported here. Additional work could also take place in replicating the survey for true small business organizations across the country and comparing the findings to the results of this study, Finally, as wireless and widearea networking become more common place in small businesses, additional studies should take place pertaining to security issues in these areas. 7. Conclusion Computer security is a growing problem for all businesses large and small and, according to Hulme [6], the hackers are winning. In 1998, 50 percent of businesses survey reported no attack-related downtime. This year only 6 percent make such a claim [6]. This study has shown that small business owners are well aware of this problem, yet less than half of them are proactively taking appropriate steps to adequately protect their computer systems. As a business grows and advances across the technology phases of the model shown in Figure 2, owners should recognize the increasing need for vigilance and the increasing cost for computer security protection. The average business spends 12 percent of its IT budget on security [6]. This includes the cost of in-house computer security experts. While most home-based small business owners can not afford their own computer security expert, it is not 5
6 hard to search the Internet for advice on what to do (see [2] for example). The basic foundation should be a computer security plan and the determination to meticulously stick with its implementation [11]. There are, undoubtedly, numerous conclusions that could be drawn from the results of this study. One thing seems clear. In spite of all the news stories, government efforts, and educational programs, small business owners attitudes and actions toward computer security have not improved significantly in the past decade. One might well ask the question, Why aren t small business owners more proactive in taking steps to counter computer security risks? While this study did not directly address this issue, an analysis of the general comments area of the survey suggests that the owners felt content with the fact that they had taken some steps in the past to ward off the security threats. Many also felt that the likelihood of their business having a serious problem was low and that if a problem did arise; it would be relatively easy and inexpensive to deal with. Overall, these owners, as entrepreneurs, are mainly focused on making money and unless and until they begin to understand the business costs in wasted time, unhappy customers, and lost sales due to computer security attacks their attitudes will probably not change. That is, not until they learn by sad experience the increasing reality of such attacks, which will most likely be sooner than later. 8. References [1] Bradbard, David A., D.R. Norris, and P.H. Kahai, Computer Security in Small Business: An Empirical Study, Journal of Small Business Management (January 1990), Vol. 28 (1), pp [2] CERT, Home Computer Security, Retrieved 7/13/04 from ity/ [5] Foster, K., Spam will be 60% of all by mid 2004, Blooberg News, September 29, 2003 [6] Hulme, George, Under Attack, Information Week, July 5, 2004, pp [7] Koch, Harold L. and C.L. Liechty, Reducing Disconnects in the Design Agency-Client Relationship: Process Management can be the Solution, published in the Conference Proceedings of the International Business Research Society (May, 2003), pp [8] Pendegraft, Norman, L. Morris and K. Savage, Small Business Computer Security, Journal of Small Business Management (October, 1987), Vol. 25 (4), pp [9] Roberts, P., Spam Influx Reaches New Heights, PC World, Sept. 10, 2004 [10] SCORE, Small Business Internet Trends, Retrieved 7/6/2004 from [11] Spinellis, D., S. Kokolakis, and S. Gritzalis, Security requirements, risks and recommendations for small enterprise and home-office environments, Information Management & Computer Security, 1999,Vol. 7 (3), p [12] Stone, Brad, Soaking in Spam, Newsweek (November 24, 2003), pp [13] The Economist, A survey of e-commerce (Unlimited opportunities? The internet offers huge scope for both business and leisure, but security urgently needs to be improved), May 2004, pp [14] Wildstrom, Stephen H., Fighting Viruses Begins at Home: Every PC owner should take a few protective steps to buttress security, Business Week (September 8, 2003), p. 18. [3] CERT/CC. Statistics , Retrieved on 6/7/04 from [4] Dreazen, Yochi J., Workplace Security (A Special Report); The Sky is Falling? Software and tech-security companies are sounding the warning and hoping to profit from the fears, The Wall Street Journal (September 29, 2003), p. 4. 6
7 Figures Security Risk, Vulnerability, Cost of Protection, Effort Required Stand- Alone PC Dial-Up Internet High-Speed Internet Wireless Network Wide-Area Network Extent of Technology Figure 1: Increasing Security Requirements for Increases in Technology $0 $1-$5 $6-$10 $11-$15 $16-$20 $21-%25 %26-$30 >$30 Monthly Fee Figure 2: Willingness to Pay for Comprehensive Security Service 7
8 Tables Table 1: Population Demographics Gender Males Females Education H.S. Or Less Associates Degree or Some College A Bachelor s Degree Master s Degree Professional Degree (Ph.D., M.D.) Income Less than $24,999 $25,000 to $49,999 $50,000 to 74,999 $75,000 to $99,999 $100,000 or over Number of Hours Per Week on 6 hours or less per week The Computer 7-13 hours hours hours 35 or more hours/week Age State of Residence 41 States Represented Texas - 38 California - 37 New York - 16 Florida 15 Utah 11 Washington 11 Illinois, Virginia, Indiana, Minnesota 29 Remaining States 50% 50% 6.5% 36.6% 31.9% 16.8% 8.2% 8.6% 17.6% 21.6% 16.8% 23.7% 14.7% 23.7% 22.4% 18.1% 21.1% 2.6% 8.2% 19.4% 29.3% 29.7% 10.8% 16.4% 15.9% 6.9% 6.5% 4.7% 4.7% 12.5% 33.4% Table 2: Awareness of Internet-based Threats Unaware Somewhat Aware Aware Count Percent Count Percent Count Percent Trojan Horse % 64 28% 67 29% Spyware 95 41% 76 33% 61 26% Hacker Attacks 53 23% % 76 33% Uninvited Pornography 26 11% % % Virus Attacks 19 8% 84 36% % Identity Theft 33 14% % 98 42% Spam 15 6% 72 31% % Pop-ups 17 7% 84 36% % Total % % % 8
9 Table 3: Threat Concern and Incidence Median Average Percent Percent Percent Concern Concern Extremely Highly Had Rankings Level Concerned Concerned Problem Virus Attacks % 91% 74% Identity Theft % 80% 6% Hacker Attacks % 72% 9% Uninvited Pornography % 80% 80% Spyware % 81% 26% Trojan Horse % 78% 17% Spam % 81% 88% Pop-ups % 78% 89% Table 4: Multiple Types of Security Incidences Number Different Problem Areas Percent of Respondents Table 5: Use of Multiple Types of Security Measures Number Different Types of Protection Percent of Respondents Table 6: Significant Demographic Differences Area - Item Pearson Chi-square Significance Level Gender A -How aware are you about the Internet-borne threat of virus attacks? A - How aware are you about the Internet-borne threat of uninvited pornography? A - How aware are you about the Internet-borne threat of identity theft? A - How aware are you about the Internet-borne threat of Spyware attacks? A - How aware are you about the Internet-borne threat of Trojan Horse attacks? A - How aware are you about the Internet-borne threat of Pop-ups? C - How concerned are you about the Internet-borne threat of virus attacks? C - How concerned are you about the Internet-borne threat of identity theft? P - How many types of security attacks have you experienced? Education C - How concerned are you about the Internet-borne threat of Pop-ups? P - How likely is it that you will be attacked by a security problem w/in 90 days? P - What is your level of interest in the ideal security software package? P - How many security measures (tools) have you adopted for protection? P - How many types of security attacks have you experienced? Income P - What is your level of interest in the ideal security software package? P - How many security measures (tools) have you adopted for protection? P - How many types of security attacks have you experienced? Age C - How concerned are you about the Internet-borne threat of Hacker attacks? Region A - How aware are you about the Internet-borne threat of Spyware attacks? A - How aware are you about the Internet-borne threat of Trojan Horse attacks? C - How concerned are you about the Internet-borne threat of Spam s? P - How well does your current security package(s) protect your computer? P - How many security measures (tools) have you adopted for protection?
Statistical Analysis of Internet Security Threats. Daniel G. James
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
More informationNetsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.
NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important
More informationData Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks
Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks November 12, 2008 How safe is small business data? As the power of computers continues to grow, more and more of the
More informationSocial Media: Understanding User Patterns and Compliance Issues. June 2011. Electronic copy available at: http://ssrn.com/abstract=1859443
Social Media: Understanding User Patterns and Compliance Issues June 2011 Electronic copy available at: http://ssrn.com/abstract=1859443 TABLE OF CONTENTS I. Executive Summary....3 II. Key Findings of
More information5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
More informationC&G FLUX MARKET Internet Safety
Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More informationComputer and Information Security End User Questionnaire
Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/
More informationCourse: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
More informationComputer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
More informationThe Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: info@cs3-inc.com The Reverse Firewall: Defeating
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationesoft Technical White Paper: Who Needs Firewall Protection?
esoft Technical White Paper: Who Needs Firewall Protection? "Without the protection of a firewall, which serves as a buffer between an organization s internal network and myriad external networks including
More informationNetwork Security Survey of Small Businesses
Network Security Survey of Small Businesses July 2006 Copyright All Covered Inc. www.allcovered.com Executive Summary Most small businesses now make use of a network of PCs and servers to run their operations.
More informationDigital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET
Digital Barracuda Information Security Worms is Only the Tip FACT SHEET from Viruses and Worms is Only the Tip Do you have security with teeth? You had better, because if the worms don t get you, the viruses
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationFinally, An Easy Way To Never Have To Deal with Computer Problems Again!
Finally, An Easy Way To Never Have To Deal with Computer Problems Again! Finally, An Easy Way To Keep Your Computers Running Faster, Cleaner, And Problem Free Without The Expense Of A Full-Time IT Staff
More informationHow To Secure A Remote Worker Network
Key Steps to a Secure Remote Workforce Telecommuting benefits the employee and the company, the community and the environment. With the right security measures in place, there s no need to delay in creating
More informationSurvey Analysis Guidelines Sample Survey Analysis Plan. Survey Analysis. What will I find in this section of the toolkit?
What will I find in this section of the toolkit? Toolkit Section Introduction to the Toolkit Assessing Local Employer Needs Market Sizing Survey Development Survey Administration Survey Analysis Conducting
More informationEmerging Trends in Malware - Antivirus and Beyond
Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationFirewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationHow To Manage A Patch Management Program
Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.
More informationContact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
More informationINSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow
Symantec Security Response WHITE PAPER Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow Symantec Security Response INSIDE What it is? How does this affect me? What can I do to make
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationCloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost
y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection
More informationIBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure
IBM Global Small and Medium Business Keep Your IT Infrastructure and Assets Secure Contents 2 Executive overview 4 Monitor IT infrastructure to prevent malicious threats 5 Protect IT assets and information
More informationEndpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationwhite paper Malware Security and the Bottom Line
Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationSecurity survey in the United States
Security survey in the United States This document contains the results of a survey on network security in 455 small and medium sized businesses, conducted in the United States in October/November 2007.
More informationHow to Keep Your Computer Network Up, Running, and Problem FREE
How to Keep Your Computer Network Up, Running, and Problem FREE Are you frustrated with on-going computer problems - slow computer, error messages, viruses, spyware, printers not working, applications
More informationCategory: Title of Nomination. Project Manager: Job Title: Agency: Department: Address: City: State:
1. Nomination Form Information: Category: Title of Nomination Project Manager: Job Title: Agency: Department: Address: City: State: Information Security and Privacy Security 2.0: Next Generation Security
More informationGlobal Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
More informationMobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
More informationDEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
More informationMulti State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure
Multi State Information Sharing and Analysis Center Briefing Paper Keeping Your Broadband Internet Connection Secure August 2007 Broadband Internet Security Keeping Your Broadband Internet Connection Secure
More informationWhat you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
More informationNetwork Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
More informationPenetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationExecutive Summary. The Problem
Executive Summary The issue of unwanted Internet content is reaching epidemic proportions. The liability risk, lost productivity, and cost of addressing these issues are especially problematic for small
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationWelcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationUsing Windows Update for Windows 95/98
Using Windows Update for Windows 95/98 Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
More informationReport on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
More informationBusiness continuity. Protecting your systems in today s world
Business continuity Protecting your systems in today s world Introduction Lee Drake, OS-Cubed, Inc. Contact: ldrake@os-cubed.com Phone: 585-756-2444 30 years of support LOL Cat warning Warning this presentation
More informationSYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
More informationState of the Web 2015: Vulnerability Report. March 2015. 2015 Menlo Security Alright Reserved
State of the Web 2015: Vulnerability Report March 2015 Motivation In February 2015, security researchers http://www.isightpartners.com/2015/02/codoso/ reported that Forbes.com had been hacked. The duration
More informationHow Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
More informationWhite Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
More informationThe Role of Public Libraries in Local Economic Development
THE UNIVERSITY OF KANSAS Policy Research Institute The Role of Public Libraries in Local Economic Development Prepared for The Kansas State Library By Robert H. Glass, Assistant Scientist Norman Clifford,
More informationMARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS
9 J.C. Arias, Robert Miller 23 MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS J.C. Arias (PhD, DBA), Robert Miller Abstract The attitudes of students to the use of credit cards is a complex
More informationTHE GENERATION GAP IN COMPUTER SECURITY:
Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever.
More informationVulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
More informationSeamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
More informationSmall Business Technology Challenge
Small Business Technology Challenge The National Small Business Association s recent Small Business Technology Survey found that 98 percent of small business owners agree that it s important to keep up
More informationCisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
More informationManaging Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
More informationHow to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
More informationImpact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
More informationAs an international professional association, IMA. Conducting the Survey
IMA Middle Conducting the Survey In May 2010 the survey was e-mailed to a sample of 4,436 IMA members in the Middle East. It was similar to the one used for the annual survey of IMA members in the U.S.,
More informationHow To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
More informationSECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
More informationBarriers and Catalysts to Sound Financial Management Systems in Small Sized Enterprises
ISSN 1744-7038 (online) ISSN 1744-702X (print) Research Executive Summaries Series Barriers and Catalysts to Sound Financial Management Systems in Small Sized Enterprises Vol. 1, No. 3 By Stuart McChlery,
More informationWHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
More informationPerception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
More informationSPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION
SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION Carl J. Case, St. Bonaventure University, ccase@sbu.edu ABSTRACT Spyware has been identified as one of the emerging and growing threats to organizations.
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationWhen you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
More informationGetting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
More informationHOSTING. Managed Security Solutions. Managed Security. ECSC Solutions
Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT
More informationGlobal IT Security Risks: 2012
Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection
More informationHosted Exchange Sales Toolkit. Common objections FAQs
Hosted Exchange Sales Toolkit Common objections FAQs Hosted Exchange Toolkit Common Objections FAQs Target Audience Usage Marketing Managers Used to create online FAQs and knowledge base content for self-service
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
More informationStable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
More informationPROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
More informationAnti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.
SecureIT Plus PC Security To learn more about Security Coverage s suite of security features, select from the Quick Links that follow. This document can also be printed, or saved to your desktop and used
More informationOutlook Safe Sender s Filtering
Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail
More informationFrequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
More informationCyber and Operational Solutions for a Connected Industrial Era
Cyber and Operational Solutions for a Connected Industrial Era OPERATIONAL & SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLD In face of increasing operational challenges and cyber threats, and
More informationCBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
More informationCouncil of Ambulance Authorities
Council of Ambulance Authorities Patient Satisfaction Survey 2013 Prepared for: Mojca Bizjak-Mikic Manager, Data & Research The Council of Ambulance Authorities Prepared by: Natasha Kapulski Research Associate
More informationIT Decisions for Small Business
IT Decisions for Small Business The most frequently asked questions and answers By Keith Powell and Chris Brandow, Invision Partners Computing technology has become a necessary business tool, and there
More informationCable Television Community Needs and Interests Assessment Fort Collins, Colorado. By Constance Ledoux Book, Ph.D.
Cable Television Community Needs and Interests Assessment Fort Collins, Colorado By Constance Ledoux Book, Ph.D. January 2004 CABLE TELEVISION COMMUNITY NEEDS AND INTERESTS SURVEY 1 Executive Summary In
More informationSoftware Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005
More informationFirewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
More informationDSL and Cable Modems: The Dangers of Having a Static IP Address
DSL and Cable Modems: The Dangers of Having a Static IP Address By Joe Edwards ECE 478 Spring 2000 1.0 Introduction As computer technology continues to rapidly progress, more and more people are abandoning
More informationTHE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
More informationA Getting Started Guide: What Every Small Business Needs To Know About Internet Security
A Getting Started Guide: What Every Small Business Needs To Know About Internet Security In This Document 1 Overview: Internet Security In Small Businesses 2 Internet Access New Business Opportunities
More informationWhite Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
More informationInformation Security Summit 2005
Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More information