contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.


IT Managers on Spyware Threat
Author: IT-Observer Staff
Friday, 13 May 2005, 12:43 GMT

A poll of IT professionals at InfoSecurity Europe exhibition, conducted by SurfControl, has highlighted the variety of entry points for spyware that IT departments currently face the prospect of protection from infection.

The poll results indicated the following regarding the origin of malware infections: 79% of IT Managers believe malware infections enter the network from web-sites, 67% believe it comes from e-mails, 39% from instant messaging, 41% from P2P software, 52% from freeware/shareware and 29% from removable media such as CDs.

The survey’s other findings shows that 95% of IT managers believe that centralized management and administration would be the most effective way to deploy an anti-spyware solution, 92% want the ability to block spyware before it arrived on the network and 94% want anti-spywayre solution to be tamper-proof from the desktop user, as many systems ineffectively permit user intervention which limits the effectiveness of the protection.

"Spyware is simply a symptom of user abuse, so to stop spyware we must look at the infection cycle and stop it there. Organisations worried about malicious code have to be able to stop the continuous cycle of infection, which is then followed by the resulting requirement for clean-up that will be a continuing drain on IT administrators, “said Steve Purdham, CEO at SurfControl.

“The challenge, therefore, is for Internet security companies to stop the cycle of infection for their customers and not dupe them into buying anti-spyware systems that don't address the key infection cycle issues. The message coming from IT professionals visiting InfoSecurity this year was that they demand an anti-spyware system that provides clean-up and protection from malware and emerging threats."

· Put spyware on the security map
· InfoSec Europe 2005: Exhibition Coverage
· Data Integrity ? The Unknown Threat
· Spyware stoppers target biz networks


Monday, May 23, 2005

Network Security

· Hackers get tricky with pharming
· Hiring a hacker? Think again, experts warn
· Why security vulnerabilities expand beyond operating system, enterprise
· How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

· picoChip, Hifn unveil WiMAX basestation reference
· Why wireless devices must be connected to critical applications
· Securing 'strange' Wi-Fi devices
· IT giants fight wireless patent

InfoSec Directory

· Phishing attacks and countermeasures
· Overview of image security techniques with applications in multimedia systems
· Inoculating SSH Against Address-Harvesting Worms
· What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

· nCipher helps combat phishing attacks with Chip and PIN
· LANDesk Named to 2005 Red Herring Top 100
· HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
· Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter