Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Desktop Security Software Risks - Part 2 > NetSparsh - Viral Content you Love & Share

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.

Reason #2: the Desktop Security Software Risks

The risks of placing software on the desktop are such that I will be breaking this article into two parts.

There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other.

In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop:

Drag

Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it.

Compatibility

After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider.

Updates

Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats.

This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them.

Lost Time

As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself.

Solution

The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities.

About The Author

Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com

Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.

timklemmer@checkinmyemail.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Beware Facebook hoax tricking people into thinking accounts hacked
The Oakland Press
Then, they send a bunch of friend requests to the original account's friend list, to try to scam the person's unsuspecting friends into granting access to their personal information by accepting the request. While account cloning is a real thing, the ...


New York Times

The Google Pixel 3 Review: Phone's Smarts Shine Through Its AI-Driven Camera
New York Times
Apple and Samsung typically show off glitzy hardware innovations — dual-lens cameras; bigger screens — to mesmerize millions into buying their new smartphones. Google has taken a different approach: It wants to sell people on better software. That ...
YouTube HTML5 Video PlayerYouTube
Translate with Google Pixel Buds - Google SupportGoogle Support
Can the Pixel record audio from a wired 3.5mm mic? - Google Product ForumsGoogle Product Forums
Droid Life
all 378 news articles »

TechCrunch

Journal raises $1.5 million to bring Google-like search to your personal life
TechCrunch
As with most tech products these days, it comes down to how much do you trust the company and how much do you care about your data? And depending on who you are, you may have a stronger threat model — that is, what threats you face based on who ...


New York Times

It's Her Job to Get More People to Act Like You Right Now
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Millie Tran, a global growth editor for The Times, discussed the tech she's using. Q. You're the first-ever global growth editor at The Times. What does a ...


NBCNews.com

Facebook says hackers saw personal info of 14 million people
NBCNews.com
Facebook said on Friday that hackers were able to access the personal information of 14 million people through a security flaw that the company first disclosed last month, and that the data exposed included information such as recent check-ins and ...
Hackers accessed personal information of 30 million Facebook usersCNN
Facebook hack update: Nearly 30 million users' data stolen. How to find out if you're one of themUSA TODAY
Facebook Hack Included Search History and Location Data of MillionsNew York Times
Washington Post -Facebook -Facebook Newsroom -Facebook
all 1,325 news articles »

The Oakland Press

Apple designer Jony Ive zealous over tech giant's most personal device
The Oakland Press
"Apple's inception was about making tech useful and relevant, in a very personal way. And the watch is unambiguously the most personal product we make," said Ive, who joined Apple more than 25 years ago and first made his mark with the candy-colored ...

and more »

The Epoch Times

Legal Malware (Apps): How Tech Giants Collect Personal and Professional Info
The Epoch Times
Commentary. This article is part of a series on corporate surveillance highlighting civil liberty, privacy, cyber security, safety, and tech-product user exploitation threats associated with connected products that are supported by the Android (Google ...

and more »

The Oakland Press

Purging long-forgotten online accounts: Worth the trouble?
The Oakland Press
Yahoo, for instance, didn't allow users to delete accounts or change personally identifying information they shared, such as their birthday, until pressured to do so after the breach. Even without these hurdles, real life gets in the way. There are ...

and more »

New York Times

How to Delete Facebook and Instagram From Your Life Forever
New York Times
That means any personal information that I had collected in my account, including my photos, message transcripts and friends list, and that I did not already have copies of elsewhere. To help with this, Facebook offers a comprehensive tool called ...


USA TODAY

Microsoft co-founder Paul Allen dead at 65 from non-Hodgkin's lymphoma
USA TODAY
SAN FRANCISCO – Paul Allen, a technology pioneer who helped launch the personal computer revolution as co-founder of Microsoft with Bill Gates, has died, according to his company, Vulcan Inc. The cause was complications from non-Hodgkin's ...
'Our industry has lost a pioneer': Tech titans are devastated by the death of Microsoft cofounder Paul AllenBusiness Insider
Microsoft Co-Founder Paul Allen Dies at 65Wall Street Journal
Paul G. Allen, Microsoft's Co-Founder, Is Dead at 65New York Times
TIME -Financial Times
all 2,376 news articles »
Google News

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

Faster Browsing Tips

IF WE say that it was mainly because of the... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: â??Get... Read More

Why Get a Microsoft MCSE Certification?

In the years of the dot com boom and bust,... Read More

Things You Can Do To Speed Up Your Computer

Upgrading your processor will always speed up your computer, but... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

Occupational Therapy and PDAs

Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

Bluetooth Headphones For Your PDA

Nothing is worse than having to negotiate all kinds of... Read More

Tips For Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Is Digital Camera Technology Making Film Obsolete?

Perhaps not yet, but the handwriting might be on the... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

Be Prepared in the Event Computer Disaster Strikes

ComputersBusinesses and individuals alike have all grown to rely on... Read More