START -- CONNECTIVITY -- SYSTEM & APPS -- DATA
Let's start from the outside and work in.
A. Internet Access
1. Current: Dial-up connection
a. Slow download / upload speeds
b. Intermittent flakiness with recognition of modem by computer. This is a recognized problem with Windows 2000 when the user does not have administrator privileges (see below for more).
2. Recommended: higher-speed, always on
a. Higher speed: for basic efficiency, particularly for retreiving necessary updates, etc. for the computer system.
b. Always on: can schedule critical updates, such as virus signatures, for off-hours and not be dependent on staff interaction.
c. Possible solution:
Cable (preferred): if the building is wired for cable. Higher bandwidth and more reliable than DSL.
DSL: neither as fast nor as reliable as cable for this level of service (once you get into T-1 connections, reliablity soars). Recommend going with Verizon so that there is only one vendor to point a finger at.
d. Backup: dial-up modem.
B. Firewall: with an always-on connection, it is essential that the computer have a firewall. There are two ways to go.
1. Separate device. This is a combination of hardware and software that sits between the modem.
a. Benefit: separate devices tend to be more robust than software solutions in the flexibility of settings, in the ability to block manage traffic and in blocking traffic before it gets to the computer. A marginal benefit is that a separate device frees up a load on the computer.
b. Draw back: cost and one more piece of equipment to manage.
c. See firewallguide.com for more. I haven't looked into the 2 appliances they recommend. The low end SonicWall device runs about $350.00. I use SonicWall to protect my work network.
2. Software solution:
a. Benefit: cheaper to implement – Zone Alarm, a recognized system (and in process of being bought out by Checkpoint, the leader in enterprise firewalls), is free.
C. Virus and malware protection
1. I have already set up the best recommended free anti-virus/malware system on the computer, called AVG by Grisoft.
2. The issue here is not the software, but making sure that updates are retreived routinely. There are two types of updates the software needs.
a. Virus definitions or signatures: as new virii come out, the anti-virus vendors identify unique patterns of code within the virus and then add this signature to the data file used when scanning incoming messages and documents. Without the signature, the software cannot recognize the virus as malware.
b. Engine updates: this is the piece of software that performs the scans. Even if the signature is updated if the engine is not updated it will not be able to scan for the new virus.
c. Both definition and engine updates are delivered together. However, when the engine is updated, the computer usually needs to be restrarted. This is a staff management issue.
3. I have scheduled the software to request updates, but to work, the computer must be connected to the Internet. An alternative is for staff to regularly perform a manual update when the system is connected.
4. We might consider buying their upgraded version for the additional features.
D. Spyware protection
1. A growing concern is the proliferation of spyware. These programs get installed through an array of clever methods. The spyware sends usage data back to a central server in order to collect marketing and other types of information.
2. Much of the spyware is poorly written, so it slows down or screws up the operation of the computer.
3. The only known defense these days is proper surfing and download habits and the use of scanning software that must be manually started.
4. I installed the free version of AdAware . SpyBot is another candidate. Belts and suspenders recommends installing, updating, and using both on a regular basis.
E. Spam protection
1. Someone had the ISP activate Spamguard or SpamCop or whatever on some of the email accounts for the Center. I do not favor this solution.
a. Does not give the Center full control.
b. These group blocking lists are becoming flakey because the diversity of what people consider spam and ham (good emails).
2. I recommend setting up POPfile on the system. I started using this software at home at have been astounded at its capabilities. The way it works:
a. It sets up an email gateway on the computer.
b. You set up the gateway to connect to your email server at the ISP.
c. You set up the email client to connect to the gateway, not the ISP server.
d. All incoming emails pass through the gateway. The gateway uses Bayesian statistical logic filters to determine, based on from: addresses, to: addresses, header content, message content, etc. how to classify the message.
e. There is a simple browser page where you can review all messages received and determine whether the filters acted properly. If you change the classification of a message, the filters adjust the weighting of their logic to accommodate your decisions.
f. You can allow or block all messages from a specific address or domain. You can also have the gateway deliver emails to different folders on your client.
g. You set up your client to deliver outgoing messages directly to your outside server.
F. Email client: by far the leading source for the activation of virii.
1. For the most part, malware requires some sort of user action, such as clicking on a link or a file in the email in order to launch the bad stuff.
2. The majority of malware relies on the active scripting in MS Outlook or MS Outlook Express to then do the damage, such as remailing from address books, grabbing passwords, etc.
3. The first line of defense is proper user behavior. The core staff at the Center understands this and acts properly. The problem is the use of the system by others, who may not be as cautious.
4. A second line of defense is to use a non-Microsoft email program.
a. I installed a trial version of PocoMail, which seemed to satisfy the staff. If this is an acceptable alternative, the Center needs to buy a license to fully activate the software.
b. Another alternative is Thunderbird, a free email client from the Mozilla Foundation. If I hadn't already bought PocoMail, I'd probably be using this one for myself.
5. See below for data issues
G. Browser
1. Another source for the invasion of malware is the web browser. Again, active scripting in MS Internet Explorer is the culprit. The problem is that even if you are not using IE as your browser, the scripting capabilities still lurk in the background.
2. For casual browing, IE is probably just fine. There are sites that only work with IE, but this is becoming less and less of an issue as web developers are starting again to code pages for a broad range of browsers.
3. For heavy users, other browsers offer greater functionality. The two leading contenders are the free Mozilla Firebird and the Opera browser. Both offer greater built-in functionality, most particularly the blocking of pop-ups.
START -- CONNECTIVITY -- SYSTEM & APPS -- DATA
|