Educational Video Unveils Tricks Hackers Use and Ways

Fiberlink Communications Corp developed an on-demand video demonstration to show CIOs and CSOs the ongoing risks that threaten mobile workers everyday. The "Anatomy of a Hack" illustrates how, without proper security protection, a hacker can take complete control of a mobile worker’s system and potentially infect a corporate network.

Security threats today go beyond idle hacking for recreation. A recent survey of the top vulnerabilities of 2005 by the SANS Institute reports that attacks are becoming less widespread, but more focused on quick financial gain. Today criminals are focusing their attacks on poorly protected applications such as Kazaa, Windows Media Player, Mozilla, Firefox, Apple Safari Browser and others with the intent to gain information that can be used in fraud.

Accompanying the video is a best practices guide that details how CIOs and CSOs can protect their networks against the most notorious types of threats including: network sniffing, malware and direct attacks. Participants will get a better understanding of:

- Common security risks and vulnerabilities that threaten today’s mobile workforce;
- Techniques, skills and tools used by hackers to exploit vulnerabilities on mobile endpoint systems;
- Best practices and essential tools necessary to help ensure mobile workers are compliant with corporate security policies

Fiberlink system engineer and mobile workforce security expert, Daniel V. Hoffman, CISSP, CWNA. Hoffman has more than 11 years of remote access and security experience. Before joining Fiberlink, he was a Telecommunications Specialist in the U.S. Coast Guard responsible for the transmission and reception of classified data. Prior to this role, he was Director of I.S. at Closerlook, owned a VPN/Security Consulting Company and was a security sales engineer with UUNET/Worldcom.

Download the educational video here:

Download the best practices video here:

The video and best practices guide are available on demand now through Jan. 31, 2005.

write your comments about the article :: © 2005 Computing News :: home page