How Safe is Your Success? Part 5 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles that address different aspects of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103503 possible (even likely) consequences, orrepparttar 103504 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103505 situation.

-------------------------

Part 5 - Phishy Tales

The word "phishing" has become something of a buzz word, yet many casual Internet users still do not know what phishing really is or how to identify it. In this part of our series I'm going to use a simple but actual email to demonstraterepparttar 103506 most common form of phishing. But first, a bit of background.

Computer and technology dictionary Webopedia.com defines phishing as "The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scamrepparttar 103507 user into surrendering private information that will be used for identity theft." Onrepparttar 103508 origin ofrepparttar 103509 word, Webopedia says "Phishing, also referred to as brand spoofing or carding, is a variation on 'fishing',repparttar 103510 idea being that bait is thrown out withrepparttar 103511 hopes that while most will ignorerepparttar 103512 bait, some will be tempted into biting".

OK, but how do you distinguish between a phishing eMail and a real message from, say, your bank or credit card provider? A phishing message may look very legitimate, with allrepparttar 103513 right logos and so on. Even most ofrepparttar 103514 links may berepparttar 103515 real thing. Although there are often tell-tales such as poor spelling or bad grammar, many examples of this scam do appear to be perfect in every respect. The only way to see what is really going on is to look "underrepparttar 103516 covers".

Whatrepparttar 103517 scammer is trying to do is get you to click on a link that will take you to a website which is different torepparttar 103518 one you think it is going to take you to. At this dummy pagerepparttar 103519 scammer will try to get you to enter sensitive information such as credit card or on-line banking details.

With plain text emails, what you see is what you get. If a link says "www.CitiBank.com" then that is exactly where it will take you. But all is not so transparent withrepparttar 103520 links in a HTML email. With HTMLrepparttar 103521 only way to tell where a link will really take you is to look atrepparttar 103522 HTML code that underliesrepparttar 103523 message. And "No", you cannot tell by hovering your mouse cursor overrepparttar 103524 link and looking atrepparttar 103525 status bar. The status bar message can be faked very easily.

All eMail client programs of which I am aware provide some means for you to look atrepparttar 103526 HTML code. In Outlook, for instance, you can right-click onrepparttar 103527 body ofrepparttar 103528 message and select "View Source" fromrepparttar 103529 pop-up menu. I've selectedrepparttar 103530 scam eMail I'm going to use because it is a very simple example without too much HTML code to complicaterepparttar 103531 picture. The original eMail as it appeared in Microsoft Outlook can be seen here: http://HackersNightmare.com/FreeContent/Other/phishing1.jpg

In a moment I'll show yourepparttar 103532 HTML code associated with that eMail. Don't worry if you don't understand HTML code at all – I'll explainrepparttar 103533 few important parts. But first, just a bit of general information to help you make sense of what you see.

In HTML code, anything that is between is called a "tag". A tag isrepparttar 103534 actual code that tellsrepparttar 103535 web browser how to displayrepparttar 103536 message text. In this simple example there are only a few tags in use, and only one of them is very important to us. The tags in use inrepparttar 103537 example email are:

repparttar 103538 equals (=) sign will berepparttar 103539 location of an image that is to appear at this point onrepparttar 103540 page. The tag must then be "closed" with a right-angle bracket >. See Lines 1 and 2.

<.BR> A line break. Several together is a series of line breaks. E.g. line 3. NOTE: The dot before BR is not part of a real HTML Tag. It is inserted so some editors will not interpretrepparttar 103541 text as a real Tag.

How Safe is Your Success? Part 6 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles that address different aspects of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103502 possible (even likely) consequences, orrepparttar 103503 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103504 situation.

-------------------------

Part 6 - Disaster Recovery

This part is a little longer thanrepparttar 103505 other seven, reflectingrepparttar 103506 extreme importance ofrepparttar 103507 subject matter.

The term "disaster recovery" means different things to different people. Even confined to events that affectrepparttar 103508 usability of computers inrepparttar 103509 conduct of business, a "disaster" can have a wide range of meanings, and "recovery" can vary quite considerably in scope. In this article I am going to restrictrepparttar 103510 meaning of "disaster" to mean data loss.

Nor will we concern ourselves with howrepparttar 103511 data may have been lost, other than to reflect briefly onrepparttar 103512 fact that events that can cause data loss are many and occur frequently. They include fire, flood, earthquake, electrical surge, theft, vandalism, equipment failure, user error, vindictive acts — to name just nine of many possibilities.

Similarly, we'll use only a narrow definition of "recovery", as in "getting back data that was lost". Beyond that, smart entrepreneurs will have at least a rudimentary Disaster Recovery Plan in place. The DRP will include information on where to quickly source replacement computers (perhaps temporary hire) and allrepparttar 103513 other things that will need to be done to get a business up and running again very quickly after a catastrophic event. Under certain policies insurers may require that a Disaster Recovery Plan be submitted for approval before cover is granted. For information on DRPs, also called Business Continuity Plans, just do a web search — there is a lot of information out there. Thinking about such things now may save your business inrepparttar 103514 future.

In practice a diverse mix of methods is used to take copies of important data, ranging from doing nothing (a disturbingly large number) to complex, expensive and dedicated network-attached storage devices. Methods in common use include burning to CD, copying to floppy (rare these days due to large file sizes), copying to another PC on a network, storing to ZIP, JAZ orrepparttar 103515 now obsolete LS-120 drives, detachable USB storage devices, and so on. And of courserepparttar 103516 venerable Tape Backup Unit (TBU). There are dozens of different tape formats, withrepparttar 103517 most common probably beingrepparttar 103518 4 millimeter Digital Audio Tape (DAT). Regardless of tape format or drive type, this method is usually just referred to generically as "tape backup", with onlyrepparttar 103519 IT professional concerned with specifications.

But no matter which method or storage media you use, backing up critical data is a pointless exercise if that backup remains inrepparttar 103520 computer, inrepparttar 103521 office or even inrepparttar 103522 building. Considering onlyrepparttar 103523 nine types of disaster I mentioned above, at least six of those can also render your backups useless, along withrepparttar 103524 original data storage, ifrepparttar 103525 backup is not taken completely off-site.

Now before you start to get bored, I'm not going to just repeatrepparttar 103526 admonition you have probably heard ad nauseum — to take your backups off-site. If you haven't been doing that up to now, then my harping is unlikely to make you change your ways. And even if you have been taking your backup's off-site, how effectively have you been doing it? Will you in fact be taking yesterday's backup with you when you leave today, and leaving today's backup running? Hey … I understand. Who wants to hang around after work every day for an extra hour or more waiting for a backup to run? And that's if you are using some automated method with a large capacity removable media, such as tape.

If you are manually backing up to some other media, say CD or ZIP drive, then you have even more work to do and no guarantee that you will be getting every important file off every computer.

Another thing to consider: Just how certain are you thatrepparttar 103527 data you are copying to a backup media is "good"? When wasrepparttar 103528 last time you performed a test "restore" from your backups to ensure that all was as it should be? I can tell you from long experience how oftenrepparttar 103529 average person does a test restore. Never!

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use