Solved

Potential security breaches in IS. How to stay on a safe side?

Posted on 2014-03-14
3
432 Views
Last Modified: 2014-03-30
Dear All,

We do a review of applications installed on employee's personal computers and found that one of employees uses Pando Media Booster. We learned that it might be using file sharing protocol (BitTorrent) that can compromise information security in our organization.

http://en.wikipedia.org/wiki/Pando_(application)

1. Is our conclusion correct?
2. Is there any proved method to classify spyware?
3. Is there any proved knowledge base that clearly states what software can be potential security breach?

Thanks in advance
0
Comment
Question by:ITm1010
  • 2
3 Comments
 
LVL 61

Accepted Solution

by:
gheist earned 175 total points
ID: 39928884
It has its own purposes, like with any other file transfer facility (including web browser) sure it can leak any information user has access to.
No you cannot clasify all implementations of bittorrent protocol as spyware because it is not.
Ask your AV vendor on how to make a custom signature that does this misclasification...
0
 
LVL 26

Assisted Solution

by:skullnobrains
skullnobrains earned 175 total points
ID: 39931506
1) like gheist said, no, or rather not more than allowing ftp, email, or roughly any protocol that can transfer a file not speaking about cds, usb keys and other removable media

if i read the wikipedia link, it seems you should be much more afraid of the virus that is supposed to have been bundled with updates for months, and the bandwidth cost of such tools.

2) yeah plenty : they all prooved to be inefficient at best

3) yes : any software that you don't need and explicitly allow should be considered as a threat.

you'll find lists of "safe" software to be useful, but trying to list dangerous software exhaustively is foolish at best. any script kiddie can generate a new version of a dangerous software with minor differences and a different name automatically a zillion time per day. morphing viruses do so automatically.
0
 
LVL 61

Expert Comment

by:gheist
ID: 39932250
Hey (3) - the owner who BYOD-s needs the software and enjoys it...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Changing Passwords for  Windows and Linux servers  in bulk 7 63
IT Contract Fee 17 133
Fixing Security Perms on Domain Controller 5 84
yahoo hack question 3 46
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now