Educational Video Unveils Tricks Hackers Use and Ways to Protect Your Enterprise From an Attack

Share Article

Fiberlink presents an on-demand video and best practice guide outlining the online risks that threaten mobile workers.

Fiberlink Communications Corp, a leading innovator and trusted enterprise partner for secure mobile workforce solutions, developed an on-demand video demonstration to show CIOs and CSOs the ongoing risks that threaten mobile workers everyday. The "Anatomy of a Hack" illustrates how, without proper security protection, a hacker can take complete control of a mobile worker’s system and potentially infect a corporate network.

Security threats today go beyond idle hacking for recreation. A recent survey of the top vulnerabilities of 2005 by the SANS Institute reports that attacks are becoming less widespread, but more focused on quick financial gain. Today criminals are focusing their attacks on poorly protected applications such as Kazaa, Windows Media Player, Mozilla, Firefox, Apple Safari Browser and others with the intent to gain information that can be used in fraud.

Accompanying the video is a best practices guide that details how CIOs and CSOs can protect their networks against the most notorious types of threats including: network sniffing, malware and direct attacks. Participants will get a better understanding of:

  • Common security risks and vulnerabilities that threaten today’s mobile workforce;
  • Techniques, skills and tools used by hackers to exploit vulnerabilities on mobile endpoint systems;
  • Best practices and essential tools necessary to help ensure mobile workers are compliant with corporate security policies

Fiberlink system engineer and mobile workforce security expert, Daniel V. Hoffman, CISSP, CWNA. Hoffman has more than 11 years of remote access and security experience. Before joining Fiberlink, he was a Telecommunications Specialist in the U.S. Coast Guard responsible for the transmission and reception of classified data. Prior to this role, he was Director of I.S. at Closerlook, owned a VPN/Security Consulting Company and was a security sales engineer with UUNET/Worldcom.

Download the educational video here:

http://www.demosondemand.com/clients/fiberlink/002/page/index_new.asp

Download the best practices video here:

http://www.fiberlink.com/system/modules/com.fiberlink.site/resources/AnatomyOfAHack-CompanionGuide.pdf

The video and best practices guide are available on demand now through Jan. 31, 2005.

About Fiberlink

Fiberlink provides the software and services that enable enterprises to securely mobilize their workforces and strike the best balance of user productivity and IT control. Since 1994, more than 800,000 mobile workers have relied on Fiberlink’s solutions for access to e-mail, corporate data and other network-based resources. Today, Fiberlink’s mobile workforce solutions go beyond basic network connectivity to ensure IT organizations have control over the myriad security threats, compliance policies and cost concerns that are often associated with mobile computing. Gartner, Yankee Group and Burton Group consistently recognize Fiberlink as an innovative leader in mobile and remote access solutions. Fiberlink customers include Continental Airlines, Grant Thornton and Targus Group International. Headquartered in Blue Bell, Pa., Fiberlink has offices throughout North America, Europe and Asia. Additional information about Fiberlink is available at http://www.fiberlink.com.

Susan Sutton

Fiberlink Communications Corp.

(215) 664-1753

James Boike

A&R Partners for Fiberlink

(212) 905-6157

© 2005 Fiberlink and the Fiberlink logo are trademarks of Fiberlink and may be registered in certain jurisdictions. All other brand names are trademarks of their respective partners.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Susan Sutton
Visit website