My Library and Courses
Last Update: Tuesday June 25, 2019

Key Idea: Inform Yourself

Ron Busch, vice president of operations at Office Pavilion, told us that knowledge about the threat is one of the best defenses against potential attack. Here David Perry validates Ron's comments.

Key Question:

A: A: 

Take advantage of the billions of dollars that McAfee, Microsoft, Symantec, Trend Micro, the federal government and others are spending to improve our information systems security. You heard our experts talk about a firewall to safeguard your perimeter. This is particularly critical if you have a virtual private network or an intranet where you allow access to your information system from a remote location. Information technology experts refer to a firewall as a chain-link fence. That's still a fence, but it has its limitations.

Make sure someone in your organization is looking at the firewall log on a regular basis. The log will show who accessed your system and who tried to access the system but failed. It's important to know how far they got, where your vulnerabilities are. An IT consultant can use a device known as a “sniffer” that traces packets of information and provides valuable information regarding your weaknesses. Consider having a security audit conducted of your information system. Just as you have your financial statements audited, there are experts available who will audit your information system. You can develop an action plan, if necessary, to address any audit findings.

Questions for this clip: 1 | 2 | 3

Think about it

Have you protected your information system and the information it houses adequately?

Clip from: Protect Your Priceless Data - Understand Security

Meet Art Wong of Symantec, data security guru

Silicon Valley, Seattle, San Diego:  One of the biggest problems in small business today is that we under-estimate the value of our data and we have trouble believing anything can happen to those computers - until it does. And, it will. Issues that face each of us range from viruses to automated internet attacks to outright theft and natural disasters. The cost of these issues in lost information and lost time sometimes is the business itself. Most of us know we need to take a few steps to secure our data but simply do not know where to start.  This episode of the show is our 1-2-3. Please, have somebody in your business become an expert. If you are a sole proprietor, you'll just have to do it!

Go to all of the key ideas and videos ...
Go to the homepage for this episode...

Trend Micro, Inc.

David Perry, Global Director of Education

Visit our web site: http://trendmicro.com

Business Classification:
Security

Year Founded: 1988

Inform Yourself

DAVID: What is a virus? It is any program that makes copies of itself. That's what a virus is. Trojans are viruses that don't replicate. It's a dirty trick that just sits in one place usually they have a wrapper like the "Trojan horse." It'll show up and it's game or a screen saver or whatever. Someone will run it and the next thing they know is their computer is open to the Internet and the person who wrote that can control them from afar.

There are Zombies that are used in denial of service attacks. There are adware and spyware which is growing rapidly as a threat. So you really need protection across a range a spectrum spread of malicious content. It is content security.

Not a member yet? Learn!  Be empowered! Join us!