30-08-2004 • VOLUME 7 • NUMBER 32 • £2.60 WWW.ITWEEK.CO.UK 19 CLIENT Intel boosts Centrino wireless kit 23 NETWORK Top tips to avoid WLAN interference 28 MANAGEMENT The case for server-based computing CONTENTS ENTERPRISEWEEK Lotus Workplace for teamwork 13 Why change an Oracle database? 14 Mono for dot-Net development 14 INTERNETWEEK DTI advises firms on net usage 17 Will interactive TV help business? 18 Insider’s view of W3C web specs 18 CLIENTWEEK KDE boosts free Linux interface 19 USB Flash storage and security 20 IBM serves up self-control chips 20 NETWORKWEEK Service to control wireless LANs 21 Cheaper appliances for SSL VPNs 21 StealthWatch kit spots anomalies 24 MANAGEMENTWEEK Councils get better CRM advice 27 Fujitsu Services chief interviewed 28 Outsourcing and the law A banking supervisory body has issued free guidelines to help firms comply with corporate governance rules if they outsource work. The Joint Forum guide emphasises the need for due diligence when selecting partners, and advises firms to set up risk management programmes to address activities to be outsourced and the supplier relationship. It suggests both parties should have disaster recovery plans and regularly test backup. In a separate move, the National Association of Software and Service Companies in India is to audit the data security policies of its 860 member IT service provider and software firms, to reassure European customers that offshore data will be protected. The audit will be carried out by consultancies such as PwC and Ernst & Young and will lead to the establishment of a new security standard. Offshore data, p4 Leader, p10 www.bis.org/publ/joint09.htm Inside crimes reap millions Madeline Bennett T he US Secret Service and security body Cert last week urged firms to tighten defences against employeedriven IT crime, after a two-year investigation provided extensive detail on staff fraud in the finance sector. The investigation by the two organisations analysed breaches carried out by insiders between 1996 and 2002, involving sums of up to $691m. It found that 78 percent of thefts were carried out by authorised users with little technical know-how. Despite banks’ investment in sophisticated anti-intrusion technology, most insiders were detected by more prosaic means, such as “an inability to log in, customer complaints, manual account audits and notification from outsiders”. The most common way for a firm to learn of an inside theft was through its customers, who accounted for 35 percent of tip-offs. The investigators said anomaly-detection tools, which register suspicious use of applications, proved expensive and largely ineffective.“It is likely that the detection and SP2 awaits support tools M icrosoft last week issued a guide to application compatibility testing for Windows XP SP2 but remains months away from delivering related tools. It is also experiencing problems with a key tool for delivering the 275MB of service pack code. The problems mean that despite SP2’s promise of added security, many firms are delaying or shelving update plans and will not install it until next year. One consultant who has been working with large sites on SP2 planning complained that partners have had little time to prepare. “Microsoft has not been particularly clever about disseminating informa- tion and people who have not turned off automatic updates have a serious problem – it breaks a lot of apps,” he said. Some experts estimate that when SP2 is installed about one in 10 applications will not work as before; Microsoft lists more than 40 such programs. Last Wednesday, Microsoft released its Application Compatibility Testing and Mitigation Guide but a beta-test version of the Gates: SP2 key to security companies often focus on assessment of this kind of STEPS TO FIGHT STAFF CRIME the wrong aspects of secinsider incident will conurity. “The technology tinue to require manual Log application use exists to detect incidents diagnosis and analysis for or reduce risks,” he said. the foreseeable future,” the Restrict remote access “But management needs investigators conclude. to stop worrying about Instead, firms should Increase internal audits network intrusion detecfocus on improving poliTighten access controls tion in the abstract and cies and procedures in start looking at it as part areas such as password Source: Cert of a business process.” management, and logging The US investigation examined 23 inciapplication use. Firms should also ensure dents carried out by insiders. In one case, an that at least two employees are present investment bank employee altered data in before critical data can be modified. trading systems so he appeared as one of Lynn McNulty of IT security certificathe bank’s top performers, when he had tion body ISC2 supported the use of auditactually lost the firm more than $600m. ing and monitoring to detect incidents.“But Less than a quarter of the crimes were many firms have not invested as much as carried out by IT staff, and most exploited they could in auditing tools and the human weaknesses in organisations’ policies. In capital to run them,” he added. most cases, the crimes were carried out by Firms are also advised to be cautious authorised users using simple, legitimate about remote access. Cert recommends a commands – for almost half their username layered approach, enabling remote access to and password were enough. non-critical data but only giving staff inside the building access to critical data. Outsourced security, p4 Identity theft, p5 Mike Small, European director of secu Nokia, p6 Leader, p10 Data theft, p20 rity strategy at Computer Associates, said www.secretservice.gov/ntac_its.shtml Windows Application Compatibility Toolkit 4.0 software, written for SP2, is not due until October. Also, Microsoft has acknowledged that SP2 breaks its own SMS 2003, often used to deliver upgrades. Though Bill Gates hailed SP2 as “a significant step” in securing PCs and Microsoft cited analyst Rob Enderle advising buyers “to apply it at your earliest opportunity”, others are circumspect. Analyst firm Gartner advised testing PCs with chips that support the DEP function, designed to prevent worms spreading via buffer overruns. AMD has this support now but Intel will not provide it until October at the earliest. NT4 plans, p5 Microsoft costs, p5 Firms wary of SP2, p9 Threats, p11 www.tinyurl.com/6l6wn PDA boasts VGA screen Fujitsu Siemens’ new Pocket Loox 720 has a 480x640 VGA resolution screen, enabling it to be used for apps that previously required a laptop or PC.The £325 + VAT The 720 PDA runs Windows has a camera Mobile 2003 for Pocket PC Second Edition and has WLAN and Bluetooth capability. A 710 model at £279 has a standard 240x320 screen. Full PDA details inside, p8 NEWS INSIDE: SECURITY ID theft, p5 • NT4 Support, p5 • STORAGE NAS kit, p6 • NETWARE Linux, p8 • WI-FI Clients, p9 • INTEL Prices, p9 • SP2 Plans, p9