Category Archives: Security
Guest Post :: Four Reasons for Archiving Email Correspondence
The following Guest Post is from Jesmond Darmanin, a Web Marketer with GFI Software, and it explains the "Four Reasons for Archiving Email Correspondence":
Email is a primary source of documentation for many organizations and it has taken on an increasingly critical role in corporate court proceedings, regulatory compliance and legal discovery. Companies are realizing the importance of archiving their email correspondence, since being in a position to retrieve an old email could save them thousands of dollars in legal fees and fines, as well as their credibility.
The following are four legal reasons why companies need to archive their email correspondence:
- The Securities Exchange Act of 1934 (the ‘1934 Act’) :: requires various entities to maintain records for five years and more. Failure to do so can result in severe fines.
- The Commodity Futures Training Commission (CFTC) :: requires futures commission merchants to keep records for five years. Failure to comply can result in hefty fines.
- The Sarbanes-Oxley Act (‘Sarbanes Oxley’) :: accountants must keep all audit or review workpapers for a minimum of five years. Violation of this rule can lead to a fine and imprisonment.
- The Financial Industry Regulatory Authority (FINRA) (formerly the National Association of Securities Dealers (NASD)) and the New York Stock Exchange (NYSE) :: members are required to preserve records for no less than six years or they can be imposed with a civil fine.
Email archiving can help companies to abide by all four requirements mentioned above, because emails are archived at server level, so no matter if a copy is deleted by the end-user from his/her computer terminal, once an archive exists with all correspondence entered into by the company then the emails are searchable and retrievable and can be presented in court or as requested. Moreover, one is also able to offer the assurance that the email was not tampered with or altered in any way, thus making it a legal and binding document that could save a company or organization a lot of money in a legal situation. Companies that are unable to provide email documentation that is requested by the courts or other legal body could be subject to hefty fines, as they would be in breach of legal requirements.
A more in depth article on e-mail archiving can be found HERE.
Jesmond Darmanin :: Web Marketer :: GFI Software
GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. With award-winning technology and a strong focus on small-to-medium sized businesses, GFI is able to satisfy the need for business continuity and productivity encountered by organizations on a global scale.
Do Macs Need Antivirus Software?
As noted here, one of the topics discussed during my presentations at the ABA TechShow was whether or not Macs need to run antivirus software. I created somewhat of a stir when I adamantly defended my belief that Macs are so secure that antivirus software is not necessary. Apple touts the Mac’s security as one of it’s main features, as shown here.
Security expert Rich Mogull seems to agree with me in his article, "Should Mac Users Run Antivirus Software?" published at TidBITS. He writes that the average Mac user does not need desktop antivirus software. He does recommend additional protection for those users who engage in risky online behavior, such as visiting questionable websites, installing strange software, failing to filter for spam, etc.
I’m interested in your opinions on this subject. Do you use anti-virus software on your Mac? Why or why not? Please submit your comments on this subject, and I look forward to seeing what my readers think.
The Mac Trojan Horse :: How to Avoid It & How to Cure It
I want my readers to be aware that there is a Mac security threat (called a "trojan horse") making its rounds across the internet. This malware, named the OSX.RSPlug.A Trojan Horse, is apparently associated with suggestive photos/videos of pop train-wreck Britney Spears. Please note that this is not virus — meaning that it can’t self-propagate from one machine to another.
When you believe that you have found the video of Ms. Spears and click to watch it, you receive a message stating that your machine lacks the necessary
codec. A disk image will then start downloading, and it can then mount and launch an installer which
asks for your admin password. If you enter the password, you have allowed the trojan horse to be installed.
Of course, you should NEVER install anything that you receive from an untrusted source. (Note: I won’t comment or pass judgment on the impropriety of searching for or viewing suggestive videos or photos of scantily clad or nude pop stars.) If you find your machine is infected, Macworld has outlined the necessary steps to remove the trojan horse from your machine.
While I know that it is somewhat disconcerting to have to remember that malware exists, since it’s not something that Mac users face that often, don’t forget that this particular threat only poses a problem if you are careless and give your Mac permission to install it. Even with this threat, Mac OS X is still quite safe and secure, and I don’t plan to get any "security software" at this time.
Source: "Trojan Horse Warning: What You Need to Know" by Rob Griffiths, published at Macworld.