A Hacker Inside Your Computer?

Written by Jim Edwards

Continued from page 1

Most people underestimate or are completely ignorant aboutrepparttar importance of information they send overrepparttar 131996 Internet when surfing websites and checking email. Even if you only use a simple dial-up account, you can unknowingly transmit a significant amount of sensitive information.

You can analyzerepparttar 131997 security of your web connection for free by going to http://www.symantec.com/SecurityCheck/ . You can also verifyrepparttar 131998 presence of any known viruses or Trojan horses on your computer. The information I saw when analyzing my personal computer frankly shocked me. I saw data I didn't even know existed staring me right inrepparttar 131999 face after I performed this analysis.

To protect your computer hardware and sensitive data you should obtain a software package called a "firewall". A firewall, when combined with a good anti-virus program, helps stop unauthorized access on your computer, prevents virus infection, and "cloaks" your data ports against a hacker scanning for openings.

Symantec.com and McAfee.com both offer excellent personal firewall and anti-virus software from their websites or you can buy them offrepparttar 132000 shelf at your local office supply store. A wise investment for anyone onrepparttar 132001 net... before it's too late!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- "Finally – a Simple, Video-Based Training System on CD-ROM that Teaches You Step-By-Step How to Make Real Money Online-100% Guaranteed!" You can start with a few bucks and a good idea to make lots of money online! I did, and I'll teach you how no matter what product or service you sell... http://www.the-easy-way.com/33days.html

Jim Edwards writes a syndicated newspaper column in plain language for non-technical people about current Internet issues, challenges, news, HOT new tools... and much more! "The Net Reporter" ==> http://www.the-easy-way.com/33days.html

Workplace Security Plan: Does Your Company Have One?

Written by Felix P. Nater

Continued from page 1

Protecting Your Company From Terrorsim From Within…

In his article Dr. Rovner, writes thatrepparttar Employee-Terrorist is “calculated” and will wait forrepparttar 105875 opportunity to strike, while usingrepparttar 105876 employer to survive beyondrepparttar 105877 stipends provided by their terrorist group,repparttar 105878 unwitting employer isrepparttar 105879 potential target depending onrepparttar 105880 type of business or government agency. But even ifrepparttar 105881 companies are not specifically targeted says, Dr. Rovner, they are indirectly and unknowingly supporting Terrorist by providing a source of income. Likerepparttar 105882 Terrorist who awaitsrepparttar 105883 call to action,repparttar 105884 disgruntled employee is “event driven” byrepparttar 105885 circumstances. Bothrepparttar 105886 “Terrorist” andrepparttar 105887 “Disgruntled Employee” share some other common opportunities as “employees”; they have access torepparttar 105888 company and are familiar withrepparttar 105889 company secrets.

The Potential Threat…

Driving home a clear and evident example ofrepparttar 105890 potential terrorist’s ability to penetrate even a secure environment, I am reminded ofrepparttar 105891 British Daily Mirror Reporter, Ryan Parry who compromisedrepparttar 105892 Buckingham Palace’s hiring and recruitment procedures by providing false credentials and gaining precarious access torepparttar 105893 President ofrepparttar 105894 United and his wife while staying atrepparttar 105895 palace. Even thoughrepparttar 105896 palace had an elaborate security system and employedrepparttar 105897 most stringent security measures to guaranteerepparttar 105898 safety of President Bush, Parry successfully breeched security by falsifying his references. According to security officials they were satisfied that bothrepparttar 105899 security and criminal records check were robust and done correctly. The response may have satisfied some political end but didn’t answerrepparttar 105900 question of what type of employee background check was done to authenticate and validaterepparttar 105901 hiring duringrepparttar 105902 screening process. Such access was a breach atrepparttar 105903 hiring phase when in all likelihood,repparttar 105904 responsibility fell onrepparttar 105905 lonely shoulders of a lowly paid clerk who merely followedrepparttar 105906 checklist.

What To Look For…?

I believerepparttar 105907 collaborative process ofrepparttar 105908 Threat Assessment Team concept enhancesrepparttar 105909 prevention and proactive essentials and promotes shared awareness inrepparttar 105910 identification ofrepparttar 105911 potential threatening applicant duringrepparttar 105912 hiring process. The same collaborative process can be used to insurerepparttar 105913 right individual passesrepparttar 105914 hiring and recruitment process early on before permanent employment. Dr. Rovner says that companies, agencies and organizations can take preventive measures. He suggests thatrepparttar 105915 Human Resource Department be a bit more aggressive duringrepparttar 105916 hiring phases by instillingrepparttar 105917 essential skills ofrepparttar 105918 investigator. Verification of all data atrepparttar 105919 hiring process is critical. He said, “One ofrepparttar 105920 scariest things aboutrepparttar 105921 Terrorist is that they look just like you and me”. While psychologist have not developed a foolproof terrorist profile, he suggests that most Terrorists posses a number ofrepparttar 105922 same traits. Tactfully worded questions duringrepparttar 105923 interview process will alertrepparttar 105924 interviewer. Dr. Rovner further suggest that sincerepparttar 105925 Terrorist possess common traitsrepparttar 105926 use of properly designed questions will tell whetherrepparttar 105927 applicant has most or all ofrepparttar 105928 traits. He suggest they are:

-Loners -Dissatisfied with their lives -Have low self-esteem -Are true believers -Are antisocial -Lack pity or remorse -Have grievances against our country and our allies -Are tremendously loyal to their terrorist group.

Anyone intimately familiar withrepparttar 105929 Threat Assessment Process would quickly discern that some ofrepparttar 105930 Terrorist’s traits and characteristics are common torepparttar 105931 disgruntled employee.

If anyone would like a copy of Dr. Rovner's article, please send me an email requestingrepparttar 105932 article.

President of Nater Associates as security management consulting firm specialzing in workplace security & workplace violence prevention. Felix retired as a postal inspector with 30 years experience.

    <Back to Page 1
ImproveHomeLife.com © 2005
Terms of Use