15. 62*'14"-$7"8*9":"-$ 51')"*%'.%!6'07%
8*"90:)%/2.2;0<0.)%
5<2'4%/2.2;0<0.)%
g
APRIL 2009 November 2008 January 2009
ADAPTATION ISSUE EDITOR'S CORNER IT BUDGETING ISSUE EDITOR'S CORNER
THE WEBSENSE V10000 EDITOR'S CORNER
Worms, Threats, & the Economy— Fools Rush In Toxic Toad, Crafty Crow and Can't Always Get New Year's Tips to Squeeze Look on the Bright
How to Secure an Insecure World? April Fools Day has come and gone,
The Wild World of Web 2.0 What You Want? More from Tight IT Budgets Side of Life
and the dreaded Conficker worm has Management of IT security is ever-
The Internet is arguably today's most crucial enterprise productivity tool. At the The law of unintended consequences is a powerful one, and in our modern world The global economy is in a downturn, and it's no secret that companies are
yet to deliver its payload. Or has it? changing, with new challenges every It's a new year, but many of the
same time, with new technologies introduced with Web 2.0, unfettered use of the of rapid communication, consequences can spread faster than ever imagined looking for ways to cut costs. According to some reports, U.S. corporate IT
Security specialists around the world day. If you're having trouble keeping problems of 2008 have followed us into
Internet at work can endanger your most critical business assets—your essential before. The impact of one careless action can be swift and difficult to contain. spending will plummet as much as 20 percent in 2009. With massive layoffs in
have taken up arms against the up, maybe it's your approach. Try 2009. All indications are that this year
information. Along with that, the economy is in a shambles, leaving companies at The story of the cane toad and its introduction to Australia is a classic tale of the works and disgruntled employees on the loose, security is more important
terrorizing Conficker worm. Experts something new, adapt to your will be a tough one for many
risk from the misbehavior of disgruntled employees as well as the unintended solving one problem while unknowingly creating a passel of new ones. than ever. How can IT managers make the most out of shrinking budgets?
have been skeptical but cautious surroundings. That's the lesson companies, and tough times can bring
errors of overworked staff. Hackers are getting better and better at what they do, MORE MORE
about the date of destruction offered of this month's newsletter. out the worst in people. We can
relentlessly nipping at the heels of security professionals. What's a security EMPLOYEE TRENDS BUSINESS TRENDS ECONOMIC TRENDS SECURITY TRENDS
up by the Conficker worm and, as is MORE anticipate that cybercrime will increase
professional to do?
MORE
often the case, the worm did not
Real Employees, Social Networking QUICK LINKS Big Get Bigger, Lousy Economy as desperate people become more
activate its mighty botnet on the
SECURITY TRENDS THREAT TRENDS promised trigger date of April first.
Virtual Problems Around the Office PRODUCT TIP OF THE MONTH Others Go Away Increases Risk vulnerable to scams and other "too
good to be true" offers. But history has
Young workers entering the market Businesses are discovering ways to
Relentless Botnets Crazy Economy CUSTOMER TRAINING The business world is in the midst of Did you know that significant plans to
Although that date is behind us, shown that times of great challenge are
are bringing social networking at boost productivity with social SUPPORT great change, with many predicting secure private information have been
vigilance must be maintained as the
Work While We Creating Criminals worm now resides on millions of
work to a unimagined new level. networking, often beginning WEBSENSE NEWS that in the upcoming year we'll see an waylaid, with the culprit being the
also times a great opportunity. Are you
an optimist or a pessimist?
Sleep A recent survey shows that e-crime
computers around the world and there
While some CIOs worry about internally. USA Today tells how one
SUCCESS STORY
increase in mergers and acquisitions lousy state of the economy? With
MORE
has tripled this last year, and points security, others find that educating tactic has companies clearing the like never before. But when the dust costs of cybercrime running as high
Researchers recently discovered a is likely a new date already scheduled QUICK LINKS
Web site operating from a server in
the finger at the recession and the
for the attack.
workers and changing the way they clutter of long email strings by School District settles and a new business steps in, as $4.7 billion per year, this may not
Learns a Lesson
resultant loss of jobs, bonuses, and secure and share data may provide creating a common forum for sharing just how secure is your sensitive be the time to cancel or delay IT PRODUCT TIP OF THE MONTH
the Ukraine, using botnets to MORE
stock value. Beware that employees the secret to protecting data in the information and ideas among financial data? security projects. CUSTOMER TRAINING
ruthlessly suck up data from 5,000 QUICK LINKS Bellevue School District is located near
who know of company's security Web 2.0 world. employees. MORE MORE SUPPORT
infected computers each day. With a PRODUCT TIP OF THE MONTH the Microsoft offices in Redmond,
weaknesses may be tempted for MORE MORE LATEST NEWS WEBSENSE NEWS
lousy economy and powerful Trojans CUSTOMER TRAINING Washington, and has a student
reasons of retaliation or gain to take LATEST NEWS
going for under $1000, it's easy to SUPPORT population that tends to be very TOUGH TIMES BOOST INTERNET CRIME SUCCESS STORY
the low road.
enter the information-stealing WEBSENSE NEWS US PRESIDENTIAL MALWARE—BARACK OBAMA INTERVIEW LURE technologically savvy. The IT SECURITY PREDICTIONS FOR 2009 PODCAST
business these days.
MORE
ROLLING REVIEW: WEB 2.0 TOOLS DEMAND A CAUTIOUS APPROACH department knew they needed SCRIPT FRAGMENTATION ATTACK MAY ASSIST HACKERS
Accountants Act
MORE SUCCESS STORY OTTAWA BUILDS ONLINE COMMUNITY OUT OF IGLOO powerful network control to protect FINANCIAL "FIRE SALE" ECONOMY: PROTECTING DATA DURING M & A to Eradicate Spam
LATEST NEWS Aussies Throw the SPAMMERS ABUSING GOOGLE'S WEB 2.0 SERVICES students from inappropriate material
WHITE PAPERS, WEBCASTS, AND MORE
Accounting firm Smith Marion & Co.
and to guard against security risks. discovered employees were spending
WEBSENSE LAUNCHES NEW, STATE-OF-THE-ART SECURITY APPLIANCE Wrench at Threats WHITE PAPERS, WEBCASTS, AND MORE
They did their homework and Websense Security Labs Second Half 2008 Threat Report countless hours wading through risky
JOIN US AT RSA WITH FREE TICKETS FROM WEBSENSE
Salmat, an Australian sales tool Enabling Enterprise 2.0 Is your 2009 security plan ready for the New Year? Review the threats that and inappropriate spam —hours that
discovered a Websense solution to do
GLOBE AND MAIL—STEALING FROM THE HAND THAT FEEDS
company, wanted to allow staff to use Learn from Charles Renert, principal researcher for Websense Security Labs, emerged in 2008, take a look forward to 2009, and receive a research report would be better spent providing
the job.
BBC NEWS: CRIME TO BOOM AS DOWNTURN BLOOMS
Web 2.0 tools to drive business how Websense discovers, identifies, classifies and adapts to content trends on a highlighting the latest threat trends. Jan 21, 9:00 am PT. services to customers They needed a
MORE
DLP: AN IMPORTANT TOOL IN PROTECTING DATA DURING M & A
growth without having to worry about global scale with the Websense Content Research Cortex white paper. REGISTER FOR THE WEBCAST proven security solution to stop spam
increasingly dynamic and virulent READ THE WHITE PAPER and bolster security. In less than an
WHITE PAPERS, WEBCASTS, AND MORE Secure Essential Data against Loss
Web-based security threats. The hour's time they deployed Websense
The Executive Guide to DLP White Paper The 2008 Email Security Report by the Aberdeen Group Can sensitive and regulated data be identified and loss prevented? Data within
solution needed to provide controlled Hosted Email Security and immediately
Research by the Aberdeen Group reveals that email security issues are causing companies is often stored, used and exchanged inappropriately. Find out how to
Rich Mogull of Securosis.com explores the business value of data loss access to Web 2.0 content to ensure reduced spam, saved time, and
lost productivity for many and discusses steps for successful remediation. discover, monitor and protect your essential information.
prevention, who needs it, how it works, and what are best practices for enterprise productivity at the same time. They protected employees from unsuitable
REGISTER FOR THE REPORT WATCH THE VIDEO
implementation. found the solution in Websense Web images and content.
READ THE WHITE PAPER Security Gateway with real-time Introduction to Websense Web Filter v7 Interface and Utilities
scanning capabilities, unmatched
16.
17. 5>0.)%?*2#6':(% 6.4<.&+,$ !".:0#)%
!"#$%
=;0.:$%/2.2;0<0.)%
When your essential information is protected,
you get to say Yes! to a whole new business environment.
Say Yes! to Websense
Web 2.0 Business Protection DLP
atworry?
InfoSec Yes!
World without
boundaries? # Yes!
Booth 502
without without without
paralysis? Yes! drama? Yes!
This copy is for placement This copy is for placement This copy is for placement This copy is for placement
only, it is not meant to be only, it is not meant to be only, it is not meant to be only, it is not meant to be
read. This copy is for read. This copy is for read. This copy is for read. This copy is for
8*'.)%=1%
placement only, it is not placement only, it is not placement only, it is not placement only, it is not
meant to be read. This meant to be read. This meant to be read. This meant to be read. This
copy is for placement only, copy is for placement only, copy is for placement only, copy is for placement only,
it is not meant. it is not meant. it is not meant. it is not meant.
Get the Essential
Information Protection
White Paper
Find out how to stop inadvertent data loss and
other threats to your business while harnessing
the full potential of your employees and the Web.
@.4'.0%