Aug 05

Several Details for Enterprise Security That Should Not Be Overlooked

We can’t put too much emphasize on enterprise network security and information security, because when you read this article, in the world, many companies are experiencing incidents huge economic losses or some even close down because of information leakage. This article hereby summarizes several protect information security have to pay attention to details, I hope you gain much after reading this article and become experts in information protection.

 

First of all, printer / fax machine is indispensable business office equipment. Printer / fax machine can bring convenience to the enterprise, but also can cause a fatal blow to the enterprise – the delay of printer / fax machine may cause confidential information leakage.

 

In a company, there is always the replacement of old and new employees. As a new employee, if he/she can browse resigned employee’s computer, and it is certainly of great benefit in understanding the new company. Such as the company’s customer records, rewards and penalties regulations, payroll, and even the important data which can only be known by specific individuals can also be seen. As business executive, network management, make sure whether there is any information that should not be known by new employees in the computer before turning over it to the new employees.

 

In addition, file sharing can greatly increase the efficiency for the staff. But someone will always carelessly disclose important information to each other when sharing files. Sometimes someone even snoop into the shared information. In order to avoid irrelevant people from peeping at the shared folder on the LAN, you can password protect the shared folder and then configure the relevant access permissions to specific people.

 

E-mail is a transit point for employees to steal information. The way of transferring company information by e-mail to steal company information accounts for 80% of information theft. Many companies do not install floppy, CD-ROM drive, USB port, but still cannot prevent employees stealing information by e-mail. Fortunately, there is a variety of e-mail monitoring software that can assist enterprise executive to monitor employees to send and receive e-mail. Therefore, in order to protect information security, and motivate employees to properly use e-mail, corporate should deploy e-mail monitoring software.

 

The data corrected by new employees in the first week is usually five times as many as which at the ordinary time. In this week, he/she can leave at anytime; he may crazily copy and transmit company’s data if he wanna steal these data for illegal purposes.

Jul 29

Automobile is Unsafe: the U.S. Hackers Will Publish Intrusion Method This Week

Two U.S. security researchers will announce the methods of network intrusion of the Toyota Prius and Ford Escape at Def Con hacker conference announced this week, hoping to attract more researchers to participate in the relevant projects.

 

Car hacking is not a new field, but the information has been kept secret to the outside. However, this situation may change, as Charlie Miller and Chris Valasek, these two well-known hacker said that they will release a detailed roadmap to facilitate outside to learn how to intrude Toyota Prius and Ford Escape critical systems through 100 pages of white paper.

 

Miller and Valasek are “white hat” hackers; their main purpose is to disclose the vulnerabilities before criminals make use of them. They will also release the software which can be used in this week’s Las Vegas Def Con hacker conference released for invasion of these two models of the software.

 

They said it has developed a number of ways to force the Toyota Prius to brake when it is in the speed of 80 miles (about 128 km), plays the steering wheel or the engine suddenly accelerates.

 

As the intelligence director of the security consulting firm, IOActive, Valasek is known to the public because he found out many loopholes of the Windows operating system. He referred to the two holes and said: “Think about it: If you are approaching to the crowd, what will happen.”

 

But the reality may be not so horrible as it sounds.

 

To exploit these vulnerabilities, these two researchers will be sitting in the car to directly connect to the network of car with a laptop computer. Therefore, the information they published won’t be used in remotely network intrusion, and this is major attacking method in the real world.

 

They hope their data to be released to encourage other white hat hackers continue to look for more car security vulnerabilities, and then fix them.

 

From the report above, we can realize how unsecure the electronic control is. Even though the electronic control can enhance the traffic safety and efficiency, it also brings about more challenges. Hackers will break in any computer as long as they master relevant skills. For almost all individuals and groups, one of the most important things is data and information, which can be considered as great fortune to people. So, try to password protect folder contained important and confidential data and information with encryption solution, and then you can add one more protection for your fortune. When you lock folder/file in your computer, you can be at ease even though hackers or malware intrude your computer.

Jul 22

Apple: Developer Center Downtime Results From Hacker Attacks

In July 22, Apple has just released a statement, explaining the Developer Center downtime events since last Thursday. The company said that its security system is compromised, the intruder may have stolen some of the developer’s name, mailing address and e-mail addresses and other personal information, but the user information is not stolen.

 

Apple is hoping to notice developers who may be affected. In addition, due to the intrusion event, Apple also decided to completely revised developer system, including updating the server software, and rebuilding the database and so on. This could also explain why the downtime lasted four days.

 

Apple expects the developer website will soon recover. The company’s statement reads as follows:

 

“Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website. Sensitive personal information was encrypted and cannot be accessed; however, we have not been able to rule out the possibility that some developers’ names, mailing addresses, and/or email addresses may have been accessed. In the spirit of transparency, we want to inform you of the issue. We took the site down immediately on Thursday and have been working around clock since then.

 

In order to prevent a security threat like this from happening again, we’re completely overhauling our developer systems, updating our server software, and rebuilding our entire database. We apologize for the significant inconvenience that our downtime has caused you and we expect to have the developer website up again soon.”

 

Apple’s subsequent verify to the IT website Macworld that the incident did not result in any disclosure of user information. The company spokesman said that all user information is securely encrypted; the intruder couldn’t come into contact with the application code or message server storage applications. But the company declined to reveal whether the government agencies are investigating this issue.

 

For every company or group, the company secrets or the confidential data and information are the most important fortune for them, so almost all companies or enterprises are focusing on data security, they choose to encrypt folders contained confidential and important data and information. Therefore, the data cannot be breached even though the computer is broken in by hackers or other malware or virus, for the folder is protected by the encryption resolution so nobody can access to it without correct password. Locking shared folder and configure different access permissions to different people can effectively protect shared data on the LAN.

Jul 15

Who Can Control The Data Security?

With the continuous development of scientific and technological, the popularization and application of computer technology is also updated at an alarming rate. Meanwhile, the attendant problems about computer system vulnerabilities result in a serious interference for majority of computer users. Especially in recent years, as computer vulnerabilities are constantly being maliciously used, its dangers are constantly upgraded.

On July 9, some Windows systems users was hacked, and a number of media reports that hackers took advantage of the vulnerability illegally released by an engineer in Google without notification to Microsoft.

 

For this hacker attack, Microsoft did not provide details, but said hackers launched a “purposeful attack”, which generally refers to the government’s or corporate clients’ Windows computer were attacked, and hackers majorly aim at obtaining confidential information for the purpose.

Regardless of users are using Microsoft’s Windows system, or Google’s Android system, some elements of system security should be taken into consideration.

First of all, using a firewall or router to help users protect their system is a good idea.

 

Second, updating security patches. Although in many cases, before deploy the patches to the production systems, the test can be extremely important, but ultimately the patches must be deployed to the system. If the patches don’t update for a long time, your computer may well easily be the target of unscrupulous attackers.

 

Third, using data encryption, for the attention of enterprise data security system administrators, there are different levels of data encryption available, choose one solution of folder/file encryption to protect the data and information to meet the enterprises’ need. Effective data encryption can help the administrators to secure folder/file on the LAN.

 

Fourth, protecting your data by backup, data backup is used as the most important way to avoid disaster. Enterprise administrators can set directory or drive in the local, when the local file changes, the file will automatic backup in accordance with the chronological order of release management, so that users can always check backed up files.

 

No matter business or personal, the user’s data security should not be trampled by anyone. Only picking up the information security tools, grasping security autonomy, can we calmly face the dangers of such dispute!

Jul 08

Analyze American New Thinking of Information Network Security Through the “Prism”

“Information is power, but, like all other kinds of power, someone wish to take this power for their own.” This is the warning from famous American hacker Aron Swartz who left it home before committing suicide warning five months ago.

 

Internet originated in the United States, the current terminal server still lies in its hands. But the United States has always liked to play as the victim of cyber world, Snowden, such a nobody, exposed scandals, “prism” monitoring event really showed the “American” hypocrisy. From the Bush era, the U.S. intelligence agencies have processed to data mining work in nine U.S. Internet companies, including the audio, video, pictures, e-mail, documents, and personal connection information contact analysis and action. There are ten types of monitor categories: information and e-mail, instant messaging, video, photos, store data, voice chat, file transfer, video conferencing, login time, the details of social network data, including two secret surveillance program, the one is monitoring, monitoring public telephone call records, the other is to monitor public network activity. Former CIA officers, Edward Snowden revealed government crimes of violation of user privacy, causing panic in the world, and even U.S. allies have been accused of this.

 

Internet popularity provides information dissemination with the cheapest and most effective means, which also offer a unique tool to spread American values, affect the political situation in some countries. For all this, in the past few years, former U.S. Secretary of State Hillary Clinton has been working hard to promote their political idea of “Internet freedom”, hoping to promote a set of values and political ideas that U.S. government insisted on to the Middle East and some countries that are not friendly to it with the help of cyberspace which is completely under the control of the U.S..

 

The U.S. government and the military issued a series of documents and assessment report about information network security in recent decade. In these policy documents, there has been a lot of discussion about network security strategy and tactics which puts forward some new concepts, develops new idea about information network security. There is one tip in these new ideas- cyberspace blurs the boundary between militarization and civilian applications, and cyber warfare becomes an important direction of future military transformation.

 

From this, we can say these tactics is a two-sided sword which will invade personal privacy and threaten the legitimacy of “Internet freedom”. As the general citizen, we should know that our data and information in our own computer is not that safe at all, we should consider applying more secure method to protect the information in our computer. Encrypting the folder contained confidential data will decrease the threat from attacks of hackers or malware. You should protect your data with folder locker, so the encrypted folder will not be accessed by unauthorized users.

Jul 01

HP Recovery in Progress: Whitman Still Faces Challenge to Reach Victory

From the big data platform to the cloud computing operating system, from Android desktop computer to the printer, Hewlett-Packard launched a large number of new products in this “World Tour”, and these new products is no longer a follower, but have more new technology .

 

The first is its private, hosted and public cloud offerings, HP also announced the next generation of common architecture based on OpenStack. The followed are HP OS and CloudSystem Enterprise starter kit, along with new servers, tape libraries, 3P storage new products, HP comes up with a holistic solution.

 

This is Whitman’s “IT new forms”, she thought that “cloud computing, security, big data and mobile computing is changing this era,” and HP’s strategic goal is to allow the company to deal with this new form.

 

Last quarter, HP’s PC market share in China reached 7%, which is HP  new high after the incident of 315, and the in the aspect of printer, HP launched competent products which can come up with that of other major competitors such as Epson.

 

One of the outstanding products is a brisk 21-inch screen Android desktop computer, which is the first desktop computer with Android system in the industry. Apart from the market feedback, the action of launching this product itself is meant innovative.

 

Here, we may say now the competitions are almost around science and technology, and the rapid development and generation shift of electronic products makes computer, mobile phone and other scientific and technology products become one dispensable part of our life. At the same time, the data security is the attendant result the hi-tech society brings to us, we may always worry about the security of data and information stored in the computer, for they are easy to store, transfer and be stolen. When we enjoy the joy and convenience the science and technology offer us, we should protect our important data by locking file/folder for the data will be leaked via the Internet. With password protection of file/folder, the data and information will be under strict control by you yourself.

 

Even the furious competition of PC in the market, Whitman believes that “HP has started to recover,” and the iconic feature is the company concluded an internal adjustments.

 

Cite the case reported by Forbes for Whitman, after the failure that HP competed with Dell for Microsoft Bing server orders which worth $ 350 million, Whitman directly call Microsoft CEO Steve Ballmer, asking him outspoken how HP can do better. When Microsoft gave her a memorandum, HP spent one year enhancing their products, and in January of this year, HP beat Dell in the Bing order of $ 530 million.

 

But now what Whitman faces, is still an uncertain IT environment. EMC, IBM and even DELL are actively respond to the enterprise market, while Microsoft, Oracle began the transformation of cloud computing, HP’s software division has been considered a core competency, but the status that IBM are beginning to lay off increases the difficulty of HP recovery.

 

 

If HP’s recovery process is divided into two steps, which Whitman is now helping companies stopped the downward trend is the first step, and the second stage will be more difficult.

Jun 24

Companies and Governments Are Trying to Control the Internet

Tim Berners-Lee said in an interview that companies and government attempts to control the behaviors of the Internet which is against the original intention of creation of the Internet; and the public should be alert.

Berners – Lee said the Internet is facing a major threat, that a number of people who want to control it are penetrating the entire Internet based on the “Stop Online Piracy Act” as well as the Internet giant’s actions.

“If you can control the Internet, if you start to control people’s behavior, or to intercept communications information, you will be very powerful …… If this power is given to a corrupt government, they will be able to govern forever.” He said.

“Unauthorized monitoring act of government is a violation of fundamental human rights, which threatens the foundations of a democratic society.” Berners – Lee said, “I appeal to all netizens to ask for better legal protection and due process, in order to protect privacy of their network communications, including noticing them when their data are solicited or saved.”

He added: “Over the past 20 years, the network has become an integral part of our lives, tracking our use of it may be exposed to some very personal thing. Safekeeping of such information is a huge responsibility: Who do you think qualifications can use these data to determine when, or to protect these data security? “

Berners – Lee said the former Egyptian President Hosni Mubarak once cut off communication service when faced with opponents, which has given us a “wake-up call.” “A lot of people think that the network is like the air, in a free flowing, but after the incident, they will ask: ‘Who is capable of shutting off my internet?’” He said.

Berners – Lee called on the government to protect neutrality and independence of network and think this contribution to democracy can emulate the freedom of the press. He believes that organizations which run the network should has contact with the government, but they need to maintain a certain distance.

From the matter offered above, we should be aware of the importance of data security during surfing the Internet. We know that the information we presented on the Internet or even our own computer are not that safe, for they will be controlled by organizations, governments or even hackers who can get them. In order to prevent the invasion of unauthorized access to you private or confidential information, apart from stop offering detailed private information to the social networks, you should put all your important data into an encrypted folder so that they can be well protected and no one can access them without correct password. How to password protect folder? Hardware encryption or software encryption, each method has its own advantage and disadvantage, you can choose one as your need.

Jun 17

Prism: U.S. Use it to Monitor Netizens

Last week, former CIA employee, Edward Snowden’s leakage issue is called as reality version of American movies, handsome agent, glamorous pole dancing girlfriend, sophisticated state secrets, betrayal and exile, the agents system and lies, complicated Hong Kong, depressed black president, conflicts between personal privacy and national interest …… various elements are available, and some even have entitled: “Leaker: Snowden.”

This project is called “Prism” which means secretly use super software to monitor Internet users and telephone records. Now, the debate concerning that Snowden is a hero or a traitor is still in progress, Snowden’s whereabouts is still pending. Apart from these troubles and view companies and industries involved, their interests, gain and pay are a relatively clear picture.

According to Snowden, Google, Yahoo, Microsoft, Apple, Facebook, AOL, PalTalk, Skype, YouTube, etc. nine companies have been involved in espionage allegations, these companies are suspected of being involved in the issue that opening their servers to U.S. National Security Agency, which makes the government easily monitor millions of netizens mail, instant communication and data accessed.

Subsequently, these companies strongly denied the charges. But by June 14, Facebook, Microsoft admitted that the U.S. government indeed ask them for user data, and published some of the information and data content in order to get rid of quagmire as soon as possible.

 For this case, all of us, no matter individuals or groups, should turn our attention to potential information security threats. We should be aware of the security of private information and confidential data. For example, never fill your detailed information and private information in any forum, social network so that you will be less likely to be tracked through network by hackers. As for the data and information stored in the computer, their security is also an important matter that we should focus on, for once your computer are connected to Web, your computer becomes a totally open device which allow others to access your computer as well as you to contact the world. However, in this case, you cannot ignore the importance of data security, otherwise, data leakage and breaches will put you into troubles. Applying third party software to password protect files/folders stored in computer, and then they won’t be accessed unless entering right password, what’s more, the administrators can configure different access permissions so different people will have different right for the protected files/folders.

 

Actually, many people have noticed the importance of data security. For example, the forthcoming cloud computing standards will likely pay more attention to security issues, which will offer local production of hardware and software, system integration and cloud computing platform provider greater development space.

Jun 04

Top Hot Ultra-book

In this rapidly developing mobile electronic age, who can firmly grasp hot point, break the convention, who can get caught the attention of consumers? Over most of the year, the direction of development will continue to be variability and touch function. This can already be seen in the last year, capacitive multi-touch screen from the original tablet PCs and smart phones, steps into the ultra book. A number of products have realized the 2-in -1 of tablet computer and ultra book through morphological changes.

Touch-screen laptop should make many changes in products form and design because of the change in interaction, so we see a lot of ultra-book which is able to flip, rotate, slide and even be detachable. The designer emphasizes on how to solve the convenience and safety of touch-screen interaction, which is not be considered before.

Now, I will introduce some types of hot ultra book as below.

LenovoYoga13-IFI

Lenovo Yoga13-IFI (daylight orange)

Operating system

Windows 8

Motherboard chipset

Intel QS77

CPU model

Intel Core i5 3317U

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

13.3 inches

Screen Resolution

1600×900

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.0 mega pixel camera

Wireless network card

802.11b/g/n wireless protocol

Bluetooth

Support, Bluetooth 4.0 module

Notebook Weight

1540g

Case Description

Sunlight Orange

 

Asus: TAICHI 21

Asus TAICHI 21

Deformation

Dual

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 5 megapixel camera

Data interface

2 × USB3.0

Battery Type

Polymer battery, 3500 mA

Notebook Weight

1250g

Shell material

Magnesium alloy

Case Description

Silver

Acer:S7

Acer S7-191-53334G12ass

CPU model

Intel Core i5 3337U

CPU frequency

1.8GHz

The Process

22nm

Memory Capacity

4GB

Hard drive capacity

128GB

Screen Size

11 inches

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Screen description

Capacitive multi-touch

Graphics chip

Intel GMA HD 4000

Webcam

Integrated camera

Data interface

2 × USB3.0

Reader

Multi-in-1 card reader

Keyboard Description

Backlit keyboard

Battery Type

4 polymer battery, 4680 mA

Notebook Weight

1248g

Samsung : 700T

Samsung XE700T1C-A01

Operating system

Windows 8 (64bit)

CPU family

Intel Core i5 3-generation family (Ivy Bridge)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Supreme Turbo

2600MHz

Bus Specifications

DMI 5 GT / s

Memory Capacity

4GB

Memory Type

DDR3

Hard drive capacity

64GB

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Data interface

1 × USB3.0

Video Interface

Mini HDMI

Keyboard Description

Keyboard Dock

Shell material

Composite materials

Case Description

Black

Toshiba : U920t-T06B

Toshiba U920T

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

8GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Screen Resolution

1366×768

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

USB2.0 + USB3.0

Video Interface

HDMI

Notebook Weight

1520g

 Lenovo :ThinkPad S230U

Lenovo ThinkPad S230u Twist (33473QC)

Operating system

Windows 8 Professional edition 64bit (64 of professional edition)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

24GB +500 GB

Hard to describe

Hybrid hard drives (SSD +7200 rpm HDD)

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen Resolution

1366×768

Screen description

Capacitive multi-touch, support for five-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Data interface

2 × USB3.0

Video Interface

Mini HDMI, Mini DisplayPort

Notebook Weight

1580g

Sony : Duo 11

Sony D11217CCB (Metallic Grey)

Operating system

Simplified Chinese version of Windows 8

CPU model

Intel Core i3 3217U

CPU frequency

1.8GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

HDMI

Notebook Weight

1305g

Thickness

17.85mm

Shell material

Magnesium alloy

Dell : XPS 12

Dell XPS 12 (XPS12D-1508)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen description

Capacitive multi-touch

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.3 megapixel camera

Audio System

Built-in audio chip

Speaker

Built-in speaker

Microphone

Built-in microphone

Wireless network card

Intel 6235 AGN

Bluetooth

Support, Bluetooth 3.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

Mini DisplayPort

Audio Interface

Headphone / microphone combo interface

Other interfaces

RJ45 (network interface), power connector

Pointing device

Glass touchpad

Keyboard Description

Anti-leakage keyboard, backlit keyboard, full-size keyboard

Notebook Weight

1520g

Length

317mm

Width

215mm

Thickness

15-20mm

Shell material

Magnesium alloy

Case Description

Gray

 

As the rapid development of computer, we have to recognize that computer has become one important part of man’s life. We use it for work, entertainment, and living, we may take it as transfer media, storage devices, etc., and meanwhile, we should pay more attention to our information security in computer. You’d better lock files/folders to prevent someone else will access and view your sensitive and confidential data and information without your permission. 

May 27

How Much Do You Know About BYOD?

According to a new study of Cisco system inc., the so-called BYOD (Bring Your Own Device) policy saves cost for enterprise, while, at the same time, it increases the burden of employees.

Cisco’s report indicated, for the company that have high requirement of BYOD, they can save $1300 per year on each users. For users, they will take more money out of their own pocket.

This survey launched in six countries for 2,415 users reveals that after adopting the policy of BYOD, the average spending of per person on equipment is $965, and the data package fee of $ 734 will be paid per year.

The survey displays, employees bring their own device is happier than before, and perform a significant progress in efficiency. In American, staffs BYOD will shorten their working time of 81minutes per week, more than 70 hours a year.

However, this policy is not applicable for all countries, BYOD will produce negative impacts, for example, it will increase the difficulty of management and distract employees so as to reduce the working efficiency.

As for specific products, 81% BYOD staffs said they use the intelligence gathering, 56% said they would carry their tablet, 37% staffs carried laptop.

The report shows, the number of BYOD staffs is expected to increase to 406 million by 2016. At that time, this kind of employees in China will reach to 166 million, 106 million in U.S.A, and 76 million in India. At present, American has the largest number of BYOD staffs in the world.

We should be alert, the expansion of this policy will put our laptop and tablet into totally open environment, that’s to say, the private data and information stored in the device may be visited by others. If you don’t want your private information accessed by unauthorized person, you’d better take security measures to protect them, for example, you can password protect the folders and files on your computer.

 

With the help of folder protector, the data and information in your computer will be under encryption, so you can protect your private and confidential data from invasion and being stolen as well as enjoy your working time with your own devices.