Solved

Potential security breaches in IS. How to stay on a safe side?

Posted on 2014-03-14
3
440 Views
Last Modified: 2014-03-30
Dear All,

We do a review of applications installed on employee's personal computers and found that one of employees uses Pando Media Booster. We learned that it might be using file sharing protocol (BitTorrent) that can compromise information security in our organization.

http://en.wikipedia.org/wiki/Pando_(application)

1. Is our conclusion correct?
2. Is there any proved method to classify spyware?
3. Is there any proved knowledge base that clearly states what software can be potential security breach?

Thanks in advance
0
Comment
Question by:ITm1010
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 175 total points
ID: 39928884
It has its own purposes, like with any other file transfer facility (including web browser) sure it can leak any information user has access to.
No you cannot clasify all implementations of bittorrent protocol as spyware because it is not.
Ask your AV vendor on how to make a custom signature that does this misclasification...
0
 
LVL 27

Assisted Solution

by:skullnobrains
skullnobrains earned 175 total points
ID: 39931506
1) like gheist said, no, or rather not more than allowing ftp, email, or roughly any protocol that can transfer a file not speaking about cds, usb keys and other removable media

if i read the wikipedia link, it seems you should be much more afraid of the virus that is supposed to have been bundled with updates for months, and the bandwidth cost of such tools.

2) yeah plenty : they all prooved to be inefficient at best

3) yes : any software that you don't need and explicitly allow should be considered as a threat.

you'll find lists of "safe" software to be useful, but trying to list dangerous software exhaustively is foolish at best. any script kiddie can generate a new version of a dangerous software with minor differences and a different name automatically a zillion time per day. morphing viruses do so automatically.
0
 
LVL 62

Expert Comment

by:gheist
ID: 39932250
Hey (3) - the owner who BYOD-s needs the software and enjoys it...
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question