| Horse Sense #59 
						In this issue: 
 
						Trends 
						Flat panel (LCD) monitor prices 
						continue a slow decline.  It is now possible to purchase 
						a low end 19” diagonal LCD monitor for under $350.  
						Monitor makers are differentiating their products with 
						brighter displays, faster response times (good for fast 
						movement, like games and videos), specialty uses 
						(signage, TVs, touch screens), colors (black, silver, 
						gray, white, cream, etc), and enhanced properties 
						(control from a network, special mounting abilities, 
						swiveling and image rotation, USB ports, speakers, 
						anti-theft modifications).  However, computer prices 
						have dropped so quickly that monitors now make up an 
						even larger part of the typical total hardware purchase. 
						Small system builders, backed by 
						Intel, are introducing highly modular portable systems.  
						Almost all of the major parts of the system are 
						interchangeable and upgradeable, making repairs and 
						parts sparing easy. These parts include the keyboard, 
						LCD panel, hard drive, optical drive, memory, AC 
						adapter, and battery.  Over 70% of the world’s portable 
						shells are manufactured by three companies that are 
						members of Intel’s program and over 36% of the portables 
						manufactured today are manufactured by “white box” 
						(smaller, less well-known) manufacturers.  Most of the 
						major portable manufacturers won’t be using these 
						designs, at least for the near future, because of their 
						investment in proprietary technologies and their ability 
						to charge for those technologies.  While it remains to 
						be seen whether smaller system builders can make a 
						success of these new designs, larger customers love 
						them.  They can choose among a number of vendors, have a 
						greater probability of their vendor being local to them, 
						easily vary the characteristics of their notebooks 
						depending on the tasks to be handled, and stock fewer, 
						less expensive replacement parts.  Some governments are 
						already specifying such equipment.  Currently, the 
						largest single supplier of desktops, servers, and 
						laptops is the “white box” builder.  There is a real 
						possibility that Intel’s idea will work and your next 
						portable will have their modular design. 
						In an effort to reduce cost, heat, 
						and noise manufacturers are building more electrically 
						efficient computers.  You can’t pack older blade or rack 
						servers tightly together because of their heat output 
						and massive power requirements.  You can’t build small 
						and light portable computers with components that get 
						too hot to function. On a macro level, energy 
						consumption is very important as a single data center 
						gobbles more power than 10,000 homes.  While the EPA’s 
						voluntary Energy Star program has been very successful 
						in increasing the power efficiency of monitors, lasers, 
						and refrigerators, computers, especially servers, have 
						been drawing more and more power.  Much of that power 
						increase has been due to the processors they use.  High 
						performance, modern AMD and Intel processors require so 
						much power and cooling that they cannot be used in some 
						areas because of safety and reliability concerns.  
						Processor manufacturers are now designing processors for 
						breathtaking speed AND more reasonable power 
						consumption. 
						To improve performance dramatically 
						without a dramatic increase in heat, processor 
						manufacturers are building dual core processors.  If you 
						are running two processes that can be executed 
						simultaneously, each processor can run one, effectively 
						doubling your speed.  For example, antivirus, firewall, 
						and other programs run in the background on your machine 
						all the time.  They could run on one processor.  The 
						other processor could run everything else, resulting in 
						a dramatic speed increase in your applications as far as 
						you are concerned.   By the end of this year, most 
						desktops and servers will ship with two processors on a 
						single chip.  Currently, dual core processors do not 
						command a twofold price premium over the processors they 
						replace. 
						Computer crime is pervasive and 
						costly 
						If your business hasn’t been struck 
						by computer crime within the past year, you’re among a 
						very small and fortunate minority.  According to the 
						2002 CSI/FBI Crime and Security Survey, 90% of 503 
						security managers in a sampling of U.S. corporations, 
						government agencies, financial institutions and 
						universities reported breaches within a twelve month 
						period. Eighty percent attributed financial losses to 
						these violations.  Spam, phishing, and other financially 
						motivated attacks are tools for organized crime and 
						industrial espionage.  The 2002 study showed that of 
						managers with incidents, 82% reported attacks by 
						independent crackers (some were hired to do attacks, 
						some did it on their own), 75% reported attacks by 
						disgruntled employees, and 38% reported attacks by 
						competitors. 
						The cost of repairing damage done by 
						theft or fraud, hackers, viruses or sabotage ranged from 
						$1,000 to $50 million. The average was more than $2 
						million among the respondents who noted specific costs. 
						Theft of proprietary information accounted for 20% of 
						the instances in which specific costs were submitted, 
						but resulted in the greatest financial losses, $171 
						million of the $455 million reported. 
						By contrast, malicious code attacks, 
						i.e., worms, viruses, etc., were the most common 
						security problem. More than 80% of the organizations 
						were victimized by code attacks, but these occurrences 
						accounted for only 11% of the financial losses. Still, 
						viruses can make headlines when they strike. Many people 
						have bad memories of 2000’s Love Bug virus, which came 
						with an estimated $8.75 billion price tag. Not 
						surprisingly, the Internet is the most frequent entry 
						for attack and more than twice as common as an internal 
						attack, which ranked second.  Today’s statistics show a 
						big shift towards financially motivated attacks and the 
						losses are increasing dramatically. 
						If you are worried about an attack or 
						fear that you have been breached, call us.  We even have 
						friends in the FBI and Secret Service who can help you 
						track down your perpetrators and bring them to justice. 
						Are you practicing healthy 
						computing? 
						Some simple networking and security 
						questions that scare many half to death: 
						(1) Do you have an 
						employee manual? 
						(2) Do you have an 
						acceptable use policy for your network in that manual or 
						a separate document? 
						(3) Do you train 
						your people to be safe on the Internet?  Do you train 
						them to use their computing tools effectively? 
						(4) Do you have a 
						LAN and WAN network diagram, a cabling diagram, an 
						organization chart, and an information flow diagram (how 
						information flows through the organization)? 
						(5) Do you have a 
						disaster recovery plan?  Do you have a business 
						continuity plan? (They are different) 
						(6) What is 
						valuable on your network and how is it protected? 
						(7) What do 
						outsiders see of your network? 
						(8) Do you monitor 
						and manage both what comes into and out of your 
						network?  How? 
						(9) Do you have 
						written policies, procedures, and standards?  Does 
						management encourage that they be followed 
						consistently?  What are the consequences of NOT 
						following them? 
						(10) Do you know 
						what government regulations apply to your organization?  
						For example, fire, building, and electrical codes?  
						Security regulations like HIPAA or Sarbanes-Oxley? 
						(11) Do you know 
						that your backup is working?  Have you tested it?  How 
						fast can you get back in operation if you lose a 
						notebook? 
						(12) When was the 
						last time your network and security systems had a 
						checkup?  Was it before or after your last doctor 
						visit?  Even if you have around the clock on site 
						technical help, when was the last time you looked to see 
						if you were as “healthy” as you could be? Call Iron Horse and we’ll help you if these questions make you nervous. 
						The most resourceful adversary we 
						know of 
						To see a startling picture of a 
						resourceful and relentless adversary we encountered and 
						for more information on protecting yourself, click 
						here: 
						
						http://www.ih-online.com/how_secure_are_you6.htm 
					 |