Digital in the News
Vulnerabilities Creep Toward the Desktop
Dave Wreski, CEO of Guardian Digital, was recently interviewed
by LinuxInsider editor Anne Zeigler regarding the state of Linux
security and its effect on enterprise adoption.
Open Source Myths
an open source and Linux enthusiast it is wonderful to sit back
and watch Linux quickly gaining popularity among some of the world’s
most influential corporations and government agencies. In fact,
the client list here at Guardian Digital has grown to include quite
a few high-powered entities in recent years. However, as I read
of comparable organizations still remaining skeptical on the benefits
of Linux, I feel disheartened. Pinpointing reasons including steep
learning curve, weak technical support, and minimal program choices,
closed-source loyalists chose to stick with proprietary solutions.
What they don’t see is that as Linux becomes more accepted
in mainstream culture, many of those perceived disadvantages have
transcended into nothing more then information technology myths.
Here are a few I have come across recently:
#1-No Solid Technical Support
Although this may have been true at one time, Linux developers realized
that to build a market for their product they could not just simply
put it on the store shelves. They had to prove the stability of
their company and provide professional-grade technical support to
successfully solicit and maintain a steady stream of customers.
To date, most established Linux companies have support structures
and expert technical support teams designed to provide equal, if
not better, customer value then those of proprietary vendors.
#2-Steep Learning Curve
A steep learning curve was also an obstacle to Linux adoption in
the early years. Since nearly all users have at one time or another
primarily used Windows systems, a switch to a Linux-based operating
system represented a dramatic change. While there is one Windows
operating system with a universal interface, there are hundreds
of Linux operating systems each with a separate user interface.
Consequently each Linux application implemented would require the
time and patience to learn and become accustom to a new interface.
The most popular Linux vendors, however, have taken steps to minimize
this curve by providing users with simplified user interfaces some
of which even attempt mirror that of Windows. The learning curve
of using Linux has definitely been curtailed as user-friendliness
continues to increase.
#3-Limited Software Choices
As Linux gains popularity and backing of major corporations, nearly
all software applications are designed to support both Windows and
Linux environments. With Linux market share growing at such a rapid
rate, software developers are becoming aware of the purchasing power
of Linux users and are satisfying their needs for choice by providing
innumerable software applications comparable to those available
for the Windows operating system.
As some of the alleged Linux pitfalls are being observed as more
fiction then fact, the number of Linux and open source users is
growing dramatically. As we continue to develop the most technologically
advanced user-friendly applications and enterprise-grade support
services, winning over the skeptics will continue to become a less
Wreski, CEO, Guardian Digital, Inc.
How can I protect my small business network?
Small businesses have to worry about Internet security
just as much if not more then large enterprises. Not paying attention
to the security of your small business network is a fatal mistake
and could result in the end of your business. Here are some quick
security tips to keep your small business network secure and productive:
and Update Anti-virus Software.
Anti-virus software protects your network from malicious code
found in emails and downloaded from the Internet. It has the ability
to scan your system for such code and delete or cleanse the infected
file. Since new viruses are released on a monthly basis keeping
your software updated is the only way to guarantee consistent
Operating System Updates.
Your OS vendor will regularly release updates some
of which will be enhanced security features or patches to known
vulnerabilities. Pay attention to these updates and download them
as soon as they become available.
up an Internet firewall.
A firewall is your first line of defense against intruders
and unlawful activity. They screen all and block unauthorized
traffic coming into your network from the Internet.
Employees on Network Security.
Not all computer issues are caused by faceless hackers.
Many problems originate from inside the business. Protect sensitive
areas of your network with security applications and password
protections. Also, make sure that all your employees now how to
securely utilize email. Since many computer viruses are unleashed
by someone inadvertently opening a seemingly harmless email, let
them know that under no circumstances should they ever open suspicious
or unsolicited email and attachments. It may be a good idea to
incorporate written security policies in your corporate guidelines.
Because small business owners and employees are always
on the go, wireless networks are a popular option. They are also
most vulnerable to hackers. If your organization uses wireless
networks, be sure use encryption technologies.
Behind the Shield editors encourage their readers to submit questions.
The most frequently asked questions will appear in future issues.
We look forward to answering all your inquiries! Email us at email@example.com
from the Experts
Digital is pleased to provide Behind the Shield readers with informative
expert advice on what network security really means. Each month
a new topic of interest will be chosen to supply you with useful
tips and information not offered elsewhere. This month we will have
a brief discussion patching mobile devices.
Security and patch management on mobile devices is
one of the most trying tasks for administrators. With the greater
numbers of corporations relying on mobile computing, it is also
one of the most important and yet overlooked areas of information
technology. Traditionally, the security of corporate servers has
received the greatest priority. However, as viruses continue to
evolve and begin to attack laptops, PDAs, and even cell phones,
it increasingly important that appropriate measures are taken to
ensure corporate data stored on those devices is kept as secure,
if not more, then those housed on servers and office desktops.
Since mobile devices are subject to all sorts of threats including
both technological (viruses, worms, spam) and physical (lost or
stolen), it is essential that organizations who allow the use of
these instruments devise corporate policies regarding their use
and further document courses of action if exposed to these kind
of threats. Examples of policies and procedures include:
· Utilization of advanced encryption and security standards
including Wireless Equivalency Privacy (WEP) to minimize the occurrence
of WLAN-related vulnerabilities;
· Password-protection on all mobile devices;
· Encryption of sensitive documents that are stored on the
· Minimization of access to sensitive internal information
· Habitually perform data back-up on all mobile devices;
· Implementation of antivirus software on all mobile devices;
Wireless and mobile device security begins with secure server solutions.
As important as it is to have security defenses on the individual
mobile devices themselves, it is equally important to have a server
application that will provide security and inform administrators
of activity coming into their network from a wireless connection.
national and multi-national partners like AvSquare Solutions in
India, Guardian Digital is able to provide their productivity and
security solutions to customers worldwide.
Forging new grounds in open source
security systems through our strategic partnerships with various
delivers a comprehensive portfolio of Network / E-security and productivity
applications coupled with unparalleled service and support. By leveraging
the merits of the collaborative open source design model, coupled
with the company’s security and Internet expertise, AVSquare-NS3’s
solutions maintain the highest degree of security and reliability.
For further information on AvSquare Solutions please visit their
website at www.avsquare.com