P
Peter Kaufman
Hi,
My M.D. is extremely worried about security - not completely without
reason. We have found out that It is likely that some bad people with
mid-level I.T. skills had access to our server a while back and there
is some evidence that data has been recently stolen. Personally I
think it is a personnel problem but want to cover all bases.
I am protected with a firewall and monitor for intrusion, but he has
got it in his mind that there _may_ be some kind of backdoor software
installed on a server. A firewall and ID would not be effective in
that case. There is nothing in the logs showing any suspicious
activity but I know there are ways to manipulate the log files.
Can I by logging all outgoing network activity or some other way
confirm that there is no unauthorized opening of ports and
transference of data going on? What is my best approach to put both
our minds at ease?
Thanks very much,
Peter Kaufman MCP
My M.D. is extremely worried about security - not completely without
reason. We have found out that It is likely that some bad people with
mid-level I.T. skills had access to our server a while back and there
is some evidence that data has been recently stolen. Personally I
think it is a personnel problem but want to cover all bases.
I am protected with a firewall and monitor for intrusion, but he has
got it in his mind that there _may_ be some kind of backdoor software
installed on a server. A firewall and ID would not be effective in
that case. There is nothing in the logs showing any suspicious
activity but I know there are ways to manipulate the log files.
Can I by logging all outgoing network activity or some other way
confirm that there is no unauthorized opening of ports and
transference of data going on? What is my best approach to put both
our minds at ease?
Thanks very much,
Peter Kaufman MCP