FocusStor, launches a new data backup & recovery softwareWritten by Marc Bulot
FOR IMMEDIATE RELEASE Montreal, Canada, April 28, 2005 FocusStor, Online Data Backup & Recovery (www.focusstor.net), leading Canadian provider of disk-based backup and recovery solutions for small businesses since 1985, today released their newest offsite storage software. In today's insecure world, cables become unplugged, electronics fail daily, disks stop turning, viruses and hackers burden businesses constantly, and regardless of specific backup procedures, electronic records will continue to be discarded and overwritten. Each year businesses loose billions of dollars due to data loss. The factors used to determine viability and business continuity for an organization that has suffered from a significant system or data loss does not rely strictly on ability to replace hardware or rebuild infrastructure. In most cases continued success relies heavily on ability to quickly and successfully recover business critical data. Considering it's one of key deciding factors in whether your company will remain in business, shouldn't a company be prepared to make needed data protection decisions up front? Indeed, they should, and that is why FocusStor offers a highly secure data back up technology.
| | The Essentials of Wireless SecurityWritten by Daniel Robson
With wireless networks proliferating it is becoming more important than ever that sufficient security measures are put in place. And yet many people, especially those new to technology or computers in general, are just not aware of dangers of not properly securing a wireless network.Typically ‘normal’ users of products such as wireless routers dismiss any security concerns as only really being applicable to commercial concerns. After all, who would be interested in a small local set-up of two, maybe three computers? You may be surprised. There are many horror stories circulating about unsecured wireless networks, and unfortunately there is a grain of truth in most of them. The most common form that a danger to a private network can take is known as variously as ‘War-driving’, ‘war-walking’, ‘war-flying’ or ‘war-chalking.’ This involves an unscrupulous person literally driving, walking or even flying around in an attempt to find an unsecured wireless network. Once one is found a nearby wall is commonly ‘chalked’, indicating to any other passer-by presence of a ripe target. The name itself is taken from act of ‘war-dialling’, a term coined by film ‘WarGames’, where random telephone numbers were dialled in hope of finding a computer on other end of line. If a network is found, then potentialconsequences can range from fairly innocuous to criminal. At very lowest level a third-party can connect to network and access Internet connection from router. If legitimate owner of network is on a capped service this can consume a considerable chunk of their bandwidth, leading to extra charges being levied for resources which they never realised were being used. Of far more consequence are some of uses to which this stolen bandwidth could be put. In a worst case example a paedophile cruising around area could spot chalk marking and connect to compromised network. Without knowledge of network owners they could connect to any manner of illegal sites, with no record of their passing traceable to them. Because trail would stop cold at door of person who has provided them with free access.
|