MeriTalk - Where America Talks Government
Samantha Brenkert


Share
Delicious Digg StumbleUpon
View All Entries
Archive
Categories
Popular Tags
Posted: 5/16/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Security

Threats against computer systems are more than a quarter century old, yet new and complex attacks by hackers continue to wreak havoc on today’s connected corporations. For more than two decades, firewall technology—and more recently point solutions such as virus detection and prevention, encryption and patch management—have helped to protect corporate information assets from computer criminals. However, with today’s blended attacks—computer network attacks that seek to maximize the severity of damage by combining multiple threat method—these point solutions are no longer sufficient as protective layers. In fact, as the complexity of protective layers increases, new threats become more challenging to defend against as hackers exploit all of the existing protective layers in a blended front. In addition, new targets are continually becoming available as emerging technologies, such as VoIP, become ubiquitous amongst organization’s networks. Simple Internet services such as Web access, instant messaging and peer-to-peer file sharing networks (such as Kazaa), already notorious for consuming bandwidth and potentially reducing employee productivity, open up potential security holes.

Delicious Digg Facebook Twitter StumbleUpon