Horse Sense #57 

Contents:
  • A Personal Touch on the Web
  • Chicken Little May Be Right
  • New Trends and Developments
  • Chances Are You Are Using an Insecure Browser
  • Is Your Network in Chaos?
  • Multifunction Companies, Multifunction Appliances
  • Cymphonix Network Composer is a "Bag-O-Security"
  • Truth or Joke?
A Personal Touch on the Web
 
It is nice to have friends who do interesting things.  For some fun, try one of these sites:
 
www.embroidme-springfieldva.com  Jason does "commercial" embroidery for companies and high quality screen printing.  I have a shirt with one of our famous dog pictures on it that makes everyone laugh.  The picture quality is excellent even though he surprised me by using a card I mailed him to produce the image.
 
www.islandshirts.com  Lynn's mom runs this business.  Lynn (a guy) wears these high quality Hawaiian shirts that are so colorful they can cause hallucinations.
 
www.moonlightthreads.com  Cathy makes cute bibs and burp cloths that are perfect gifts for baby showers.  My wife loves them and we go through a lot of them in a week.  Fortunately, they hold up well to washing.
 
www.fruitsandberries.com  A former computer dealer correspondent of mine left the business to sell fruit and berry plants.  Not a day goes by when I don't think, "Hire me!"  I haven't tried the berries because I don't have anywhere to plant them.

Chicken Little may be Right

 
Microsoft says recovery from malware is becoming impossible:  www.eweek.com/article2/0,1895,1945782,00.asp

New Trends and Developments

 
In May 2005, portable computer sales outpaced desktop sales for the first time.  Portables have become popular because they now rival desktops in performance and capacity.  One portable can replace a home and a work PC.  Their mobility is useful to travelers and even those who just change cubicles or who want to work in the conference room or library.  They take less space and power than desktops.  But, as people become more and more mobile, they encounter new issues and sets of risks.  Wireless connections aren't as fast as wired connections.  There are security, reliability, and use concerns.  Is your wireless or wired connection safe?  How do you keep it from getting stolen?  What do you do if it gets stolen?  What if you drop it or something just wears out?  How can you connect to all the devices you need?  What is the best way to carry it?  How can you connect back in to your business safely?  How do you back up the data?  How do you manage users who might not be connected all the time to the corporate network?

Seagate bought drive manufacturer Maxtor for $1.9 Billion to become the dominant player in the disk drive business.  Seagate owns the high end of the market with its server drives and Maxtor owns a large part of the consumer drive market, and especially, the external hard disk drive market.  External drives are becoming more and more important as backup devices for portables and can also serve as additional storage for one machine or many.  Storage use is exploding as businesses and individuals store more information on their computers.  Many businesses are now asking themselves difficult questions.  Is the information I am storing subject to any regulations?  How long do I need to store something?  Where should I store it?  What information is valuable and for how long will it be valuable?  Who should have access to this information, who shouldn't, and how do I control the access?  What is involved in a disaster recovery plan?  How does this fit in with my normal operations, my backup routine, and my needs to have an archive of critical information?  How do I manage this mountain of data without paying a fortune and spending all my "free" time doing it?  For answers to these questions, we suggest you call Iron Horse before you lose critical information, the federal government fines you, you get sued, or you simply end up working too hard and paying too much to manage your information.


Chances Are You Are Using an Insecure Browser
 
Microsoft's Internet Explorer (IE) has been the default browser for some time.  However, it hasn't had a major update in some time and is extremely vulnerable to attack.  For security reasons, I and many of my clients use Firefox.  It is a lot safer than using IE.  Tabbed browsing is indispensable.  In one browser window, you can have many sites open that you can switch easily between as you might switch between tabbed folders in a file cabinet.  You can also save multiple tabs as a group.  Way cool.  The speed is similar to IE, but Firefox flunks on some very IE specific sites.  That's OK.  The code Firefox won't run is the dangerous stuff IE will.  Firefox has plug-ins that will make it more useful.  It doesn't take up much disk space or memory.  IE normally takes a large chunk of your available disk space to cache web pages.  This is a very wasteful use of your computer's resources and can slow your access to everything else and cause stability issues.  The Firefox toolbar search window can search various sites.  The download manager is good and sends the downloads wherever I want them.  It is easy to clear specific configuration and history data for security reasons.  Password management is good.  Updates are quick and easy.  All in all, Firefox is a great browser.  We only use IE when we can't use Firefox because the site owner has done something non-standard (dumb).  Firefox is also free.  Get it at www.getfirefox.com. Being able to download the full product in a single download makes it much easier for administrators to install and troubleshoot.


Is Your Network in Chaos? Moving Towards Utility Networking
 
Most small business networks are undocumented, unpredictable, not monitored or measured, without a coherent source of help, and heavily dependent on users and management staff to handle problems, generally in a reactionary crisis mode.  It is a struggle just to maintain the configuration and keep the business running.  Well managed networks resolve these issues and become tools for enhancing the business and implementing policy.  While these networks aren't completely automatic, they do behave like utilities.  You expect them to work.  The costs are reasonable and somewhat predictable.  The features and benefits are well known.  There is copious documentation.  Help is easily available.  The benefits are measurable.  Contact Iron Horse to find out where your network lies and see how you, too, can graduate from chaos to something better.


Multifunction Companies, Multifunction Appliances
 
Symantec has become the Borg of the security industry, assimilating companies like Veritas, PowerQuest, Axent, and other well known names to become the 800 pound gorilla of the security world.  As a Symantec Enterprise Solutions Partner, Iron Horse has watched a relatively small company become a multibillion dollar behemoth in only a few years.  Fortunately, Symantec keeps buying companies Iron Horse already represents, so we often know the products better than their own technicians and salespeople.  Sonicwall has also been on a buying spree lately, buying Lasso Logic (disk to disk backup appliances) and Enkoo (SSL VPN appliances).  What both Symantec and Sonicwall have in common is their recognition that network appliances are the wave of the future.  The most common network appliances focus on security.  Unified threat management products (firewalls with additional security features like VPN capability, antivirus, antispam, content filtering, etc) are a popular choice.   Both large and small companies find buying a bag-o-securityappealing.  Since multifunction security appliances consolidate multiple security technologies in one place with one interface, it makes them much easier to buy, manage, and support.  The easier security is to manage and support, the more likely it is to be effective.

 
Cymphonix Network Composer is a "Bag-O-Security"
 
The Cymphonix Network Composer is so amazing, I had to buy one for our network.  In simple terms, it allows me to manage how our critical link out to the Internet is being used.  For example, I can see who is using the most bandwidth and what they are using it for.  I caught one of my employees visiting web sites he shouldn't have been on company time and had an "interesting" talk with him.  For myself and other customers, I've used it to block inappropriate web content, documented inappropriate use of the network, to enforce internet usage policies, pinpoint people abusing the network, to find infected machines, to ensure business critical communications like voice and video get priority over file downloads, to stop antivirus and spyware downloads from web sites, to find misconfigured machines that disrupted the entire network, and to generate meaningful graphs and statistics to show how much better things are with a Network Composer in place.
 
Some people have concerns about "Big Brother" looking over their shoulder and monitoring everything they do.  Well, you can monitor a lot with this device, and surfing inappropriate web sites is a problem on a lot of networks, but even if you make the assumption that everyone that works with you is hard working and completely trustworthy, you can still have issues.  Without the Network Composer you couldn't see or correct problems like these:
 
(1)  Bob brings his daughter in to work one weekend and lets her play on a nearby computer.  She decides to play a game over the Internet with some friends.  A critical network backup doesn't complete.

(2)  Jill wants to keep in touch with some friends visiting town and uses Internet Messaging to do so.  Someone sends her a file which she executes and infects the network.

(3)  Your part time bookkeeper receives a message from your bank to confirm account information and clicks on the link to provide it giving your information to a thief.

(4)  You are making a voice over IP phone call when one of your machines decides it needs a software update from a manufacturer and begins to download it.  Your call disconnects and you can't reconnect.

(5)  You discover an infected machine on your network has been sending e mails with your name on it out to thousands of people touting an investment scam only because an annoyed customer calls you.

(6)  On a temporary basis, you set up a link to a printer and fileserver at another office.  However, you forget to take that link down.  Months later, two computers on the network are still running slow and your link out to the Internet is slower than you expect it to be.

Do you know what is happening with that critical link out to the Internet? You manage what you cannot measure.  The problem is that good management is hard to describe.  But, it is easy to see.  I believe you can make great use of it on your network, or I wouldn't have bought it for mine.  Cymphonix makes inexpensive appliances for networks of all sizes.  We are so sure you will like it that you can try out the unit for 30 days, and if you don't like it, you can send it back for a refund on your credit card or account.  We do this because no one has ever sent one back.  If you are worried that you don't have the time or expertise needed to install or manage such a device, we can provide those services as well for a fixed cost.


Truth or Joke?
 
Have you ever wondered how your computer works?  Well ... It's finally explained here in one easy-to-understand illustration: 

www.newportharbor.us/computerworks.htm

(This animation may take a moment to load.  No, we didn't think of it, but we like it!)



©2007 Tony Stirk, Iron Horse tstirk@ih-online.com