SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Ask Vendit Off-Topic Questions -- Ignore unavailable to you. Want to Upgrade?


To: Susan G who wrote (1474)9/16/2001 4:19:30 AM
From: sandintoes  Read Replies (2) | Respond to of 8752
 
Hi Susan, Do you know it never once crossed my mind that large companies wouldn't have their data stored in a secure place far away from their headquarters?

The article pointed out the short term planning by some of these corporations, with long term complications. That is the most short sightedness that I've heard of all the things that has come out of this disaster.



To: Susan G who wrote (1474)9/16/2001 6:56:37 AM
From: Vendit™  Respond to of 8752
 
Regarding charts...I'm wondering if the missing days will be left out as weekend days are now, or whether we will just have huge data gaps in each.

askresearch.com

Your point about the missing days is a good one and is why I personally wont trust daily time frame chart data for a few weeks. Intra-day 1, 3, 10 and 15 minute time frames should be just fine from reliable sources after the market has been open for at least 15 to 30 minutes IMO. It will take at least one daily cycle to complete before daily charts are going to be of any use IMO. A cycle can take up to a week or two for most stocks.

On the subject of disaster recovery; I have served on such a team for a company that I used to work for. We were frequently moved to a nuclear blast proof location in the southeast in a high security building, mainly built under ground. The training I received was intended to keep a major company in business in the event of a disaster like the WTC.

The computers we used were linked to servers about 800 miles away which were also in a secure location. In order to enter the building you needed 3 picture IDs and an instant back ground check was preformed on you once inside the lobby. Once I was cleared I was issued a magnetic badge which had to be attached to my clothing at all times. It locked and unlocked every door in the building as you neared it. This even included the bathroom doors. It did not include the main enterance. You could not leave.

The containment was large and full of servers, many as large as a typical room in your home. Living quarters were plush. All and all a wonderful experience.

My point here is to make readers aware that companies like IRM are real businesses which may now be in greater demand as you pointed out.



To: Susan G who wrote (1474)9/16/2001 2:35:48 PM
From: Vendit™  Respond to of 8752
 
Add network security stocks to the list.

Networks boost security against attacks

An FBI warning has administrators of the nation's corporate networks double-checking--and double-locking--their systems in the wake of Tuesday's terrorist attacks in New York and Washington.

But despite the federal Terrorist Threat Advisory, which calls for IT professionals across the country to "implement appropriate security measures--both physical and cyber," experts say corporate America is a long way from ready, or safe.

Security service provider RedSiren Technologies Inc. spent the days after the terrorist assaults advising clients to take down all noncritical external Internet connections, including remote access and instant messaging capabilities. The company followed its own advice, shutting down its external Web site in the wake of the attack.

RedSiren Chief Security Officer Daine Gary is a member of the FBI's InfraGard advisory board, which issued the terrorist alert. "We know how vulnerable the country could be. We are so dependent on these networks," Gary said.
Since Tuesday's assaults on the World Trade Center and the Pentagon, Gary said a number of clients have asked for additional security measures for their networks, which RedSiren, of Pittsburgh, is providing for free for now.
Unisys Corp. is helping a number of clients in New York and Washington get back in business following the attacks, officials said. They declined to name the users specifically. For the rest of its customers, the Blue Bell, Pa., company is stressing caution.

"We are advising clients to be more vigilant," said Sunil Misra, managing principal for the Unisys eSecurity and Privacy practice. "There is, right now, no evidence of an active attack. The logs have been quiet. It may be that the hacker community, like the rest of us, has been taken by surprise and has not taken advantage of the vulnerability."
Misra called the FBI advisory "common sense" even absent specific evidence of an impending attack. He said the state of corporate infrastructure security "is not very good," adding that security assessments of networks serving airlines, nuclear plants, telecommunications facilities and other important functions need to be increased.

"This is not the time to be an alarmist," said Misra, in Boston. "But the fact is that the next attacker may not be wielding a knife. … He may be wielding a laptop."

The primary concern for RedSiren is safeguarding client networks from attack. But the subversion of corporate computing power for malicious activities is also a concern. While he had no evidence that Tuesday's terrorist assault had been aided by unauthorized use of networks or computers, "it wouldn't be a surprise to find that out," he said.

Among the recommendations RedSiren is making to clients is to review critical logs for suspicious traffic in an effort to keep corporate computers from being used for distributed-denial-of-service attacks and other malicious intents, Gary said.

"We've taken steps to make sure that we neither get hit by the forces that would do us harm nor that we be used by others as an instrument of assault," said the IT manager of a Boston-based financial services company who requested anonymity. "There are going to be other actions, we are all pretty sure of that. Cyber-terrorism is bound to be part of the mix."

Unisys' Misra said that while the attack against a corporate network may be more common and could disrupt business, unauthorized use of networks and computers to plan or execute other terrorist attacks "is a greater concern in purely human terms."

NetSolve Inc., of Austin, Texas, a provider of remote network management services, has also been warning customers to keep an eye out for suspicious network activity.

"We sent out bulletins to existing customers [saying they] might see an increase in threats against their networks and warned them to be on the lookout," said Chuck Adams, NetSolve's general manager for security services. "[We're] stepping up the level of monitoring we do on a day-to-day basis."

Adams said in the wake of the FBI warning, his company had lowered the threshold for the severity of an event that would trigger a response. So far, NetSolve had not seen any increase in suspicious activity, he said.

The FBI's InfraGard warning of increased terrorist threat comes as the agency activates its Strategic Information and Operations Center in Washington. The FBI advisory does say that the agency "has no information of any additional specific threats directed against additional targets or critical infrastructures in the United States." The advisory will expire Oct. 11.

The InfraGard program began as a pilot project in 1996, when FBI agents in Cleveland sought help from local computer professionals to find ways to protect critical public and private information systems. Today, all 56 field offices of the FBI nationwide have opened an InfraGard chapter, with hundreds of private companies participating.
All of the warnings are designed to raise awareness in a climate where security often gets overlooked, industry sources said.

"We all know security is hard work," Misra said. "It doesn't pop up on the priority list, and nothing gets done … until things happen."

zdnet.com