On Sunday, the Boston Globe printed a portion of a letter to the editor I sent in regards to one of the paper's articles. The opinion discussed the mandating of electronic health records and the importance of security for such records. Below is the complete letter.
How to protect your network from cyber-attacks
There are three measures network administrators can take to avoid the types of network attacks that plagued US and South Korean websites including www.whitehouse.gov, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures. Network based mitigation: Install IDS/IPS with the ability to track floods (such as SYN, ICMP etc.) Install a firewall that has the ability to drop packets rather than have them reach the internal server.
Astaro Receives VMware Ready Certifications
Astaro earned multiple VMware Ready™ certifications for its security products. Astaro Security Gateway, Astaro Mail Gateway and Astaro Web Gateway have all been certified as VMware Ready, and Astaro is the only Unified Threat Management provider to have submitted to and passed VMware Ready validation.
Virtualization as a Disaster Recovery Strategy
There have actually been a few major disasters in the past 10 years that have shown the value of good disaster recovery plans. Though they're far from perfect they do make a difference and can always be improved with newer techniques and technology.
Spam Is More Than Annoying
Not only is it annoying having to sift through all the garbage which clogs your inbox, but it costs you productivity as you attempt to separate the mails you need from the unwanted items. Spam rarely ends up in my own inbox due to the effectiveness of the blocking solution I use, (I use a solution from Astaro ) but many of the people I speak with daily communicate that in an inbox with 50 messages, 45 or more can easily be spam on a given day.
Ideas are for sharing
We are rolling out a new service for our partners and customers – an improved feature request site. On this new site our partners and customers can make suggestions for improvements or request totally new functionality. Not only can visitors make their own suggestions – they can vote on the suggestions of others, giving us a better understanding of the popularity or urgency of specific network security needs
Microsoft’s DirectAccess: Reinventing VPN
As we know, Virtual Private Networking (VPN) is a technology that allows remote systems to connect to a local system in a secure manner.
Advice for the Cyber Czar
Yesterday, the Washington Post reported that President Obama is preparing to announce the appointment of a national “'cyber czar,' a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks”, and that this announcement will coincide with the release of the government's cyber-security initiatives and policies. While I am not holding my breath waiting for a call from the White House, I do have some advice for the new cyber czar. First of all, it is going to be important for you to be transparent and to quell fears that this is the first step towards an Orwellian world.
ASG Beta Release Version 7.470
Our Beta community will be excited to hear that we have just made available the third package in our 7.500 release testing.
AxG Beta 7.460 Released
Greetings! We have issued another Beta Version of our not-yet-released 7.500, for those who are testing or wish to test the new features and functionality of our next major Up2Date release. For more information on the 7.500 Beta, please see our initial launch announcement . For more information on this new Beta version release, please read on