Monday, January 24, 2005

Plugging the holes in porous university networks: "Not only are student laptops outside the control of the university's IT department, but students also tend to be drawn to software and services that pose security risks. In particular, students make great use of instant messaging systems and peer-to-peer systems, which are increasingly the target of security attacks, and students also tend to be drawn to free software, such as Kazaa, which is frequently targeted by Trojans and other computer infections. Plus, students tend to connect mobile devices, which are themselves increasingly the target of attacks."—IT-Director.com