Security Information |
|
Just Whos Computer is this Anyway?
Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Here's the scoop. Over the last few weeks the company I work for has been going through a massive systems upgrade. And as part of that roll out, they upgraded everyone's computer with new versions of software via the network. Announcements were made everyday that the changes were coming and to save everything that you didn't want to lose. This upgrade, like I said before, was massive. In some cases the software was completely changed over to a new package that the end user had not seen before. There were also security upgrades that allow for remote uploads of patches and system inventories of computers. In short, about the only thing that was the same was the physical computer itself and the files we had saved on our hard drives. Access levels were changed, passwords were changed, unauthorized software and any related files were deleted, desktop options were locked, Internet access was throttled down (and a content proxy server brought online) and a whole host of other changes implemented. (IMHO, it was about time. The network was slow and the system about 5 years out of date. Here's kudos to one company trying to make it easier for it's employees to do their jobs...) Boy, the wailing and gnashing of teeth I heard around the office would have made an IRS agent proud! Comments like, "Who said they could upgrade my computer" or "I didn't give them permission to access my computer" were common. I was floored! Ok, I'm going to clear this issue up in short order (and I apologize for the "YELLING" below...) Unless you purchased the computer you work on or you made a deal with your boss or you work for yourself, IT'S NOT YOUR COMPUTER! That's right. Take a deep breath and say the following with me, It's not my computer... It's not my computer... It's not my computer... Write that phrase out on a sticky note and stick it to the monitor. Write it in ink on the back of your hand or set up a daily pop up reminder. Do something, anything you need to do to remember that the computer you do work on for your boss does NOT belong to you. This will save you a ton of grief in the future. Why? Well it's about privacy - your privacy. Your employer has the right to do anything they want to the computers they have bought with their own money and connected to their network. And if you connect a computer you do own to their network, they also have rights pertaining to the intellectual property that may be generated by or stored on your machine. So what does this mean to you? Well, for starters, don't load anything on the computer that you don't want to be made public. Also, don't use company assets for personal stuff. In other words, don't load any banking software on the machine and balance your checkbook at work. You may lose your data files or you may even run the risk of having your bank balance exposed to the public. Or if you have any "questionable" surfing habits, surf at home. Most company networks today record and store everything, including all the places you go to on the Internet. Want to see a good example of this? Just recently, a link was posted on the Internet that allowed anyone to go search through the complete email files of everyone from Enron. Enron, since they owned all the email that goes through their servers, decided that it was too much trouble to isolate individual emails for the SEC (that's the Securities and Exchange Commission, a GOVERNMENT agency. The IRS Agent crack above may not be a joke to some...) so they released ALL the emails stored or archived on their system. Every email, whether it pertained to company business, the hemorrhoid problems of the guy in HR or how many times someone slept with someone else during lunch breaks is now out there for the whole world to see. (I don't know about you but that guy in HR better go see the doctor quick!) I bet you are thinking that this kind of thing will never happen to you. Right, just wait. Employers are monitoring you at every turn. And if you don't watch out, you could get fired over some email you sent to your Great Aunt Sophie about your dog's coming surgery or a picture that got downloaded to your hard drive from some web page you visited. Scary, right? You bet it is. Ok, now that I have gotten my point across, lets take a more realistic look. Most employers don't have some dude sitting in a closet somewhere pouring over every email sent through the system or looking at every file on every employee's computer. The sheer number of people this would take is daunting. However, what they usually do is use automated tools to look for patterns of abuse. Like multiple hits on an adult Internet site from the same user. They may scrub emails to look for offensive words, etc. Then once a pattern is identified, the employee is contacted and warned to stop. Rarely is someone fired straight out. In today's world of increased scrutiny, it behooves you to play it straight with the computer at work. Leave the personal stuff at home. Who knows, you may be surprised by the increase in your productivity. At the very least, you won't have to worry over some person reading about your hemorrhoids on the Internet. It's something to think about. Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work. He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
MORE RESOURCES: US State Department issues worldwide security alert due to potential for attacks on LGBTQ people and events KCCI Des Moines 'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative International Community Meets to Discuss the Future of Nuclear Security International Atomic Energy Agency Security Alert: Worldwide Caution - U.S. Embassy & Consulates in Indonesia US Embassy and Consulates in Indonesia Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Canada Releases Defense Policy Update to Boost Security Department of Defense Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Japan, Philippines Finalize Largest Maritime Security Pact Days After Chinese CG, Militia Aggression In SCS EurAsian Times EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review RSA Conference 2024: AI and the Future Of Security Security Boulevard The New U.S. Strategy on Global Health Security Think Global Health Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Patch Tuesday, May 2024 Edition – Krebs on Security Krebs on Security Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard Center for International Maritime Security | Fostering the Discussion on Securing the Seas. - CIMSEC FCC proposes BGP security measures Network World PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News Votiro Keeps Up the Momentum in 2024 Security Boulevard The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Making Safety and Security Intrinsic to School Design Campus Security Today The Dell API Breach: It could have been prevented Security Boulevard Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard Swift actions to mitigate the El nino weather effects on food security paid off - FAO Africanews English Yemeni security forces deploy in Aden as anger simmers over lengthy power outages The Associated Press U.S. Security Cooperation with Ukraine - United States Department of State Department of State |
RELATED ARTICLES
3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. |
home | site map |
© 2006 |