Welcome!




Expand Your Education with These Courses from
A Consumer Advocate Approach to Real Estate: Course 1.
The Psychology of Consultative Selling: Skills for Sales Success: Part Four.
Expand your education through NAR's REALTOR® University: A Consumer Advocate Approach to Mortgages: Course 2.
Bundle 2: CIPS Elective Courses (Non-US Version).
Bundle 2: CIPS Elective Courses (US Version).

Tech Talk: How to Understand Your Next Computer

Have a comment on this article? Share on Facebook!

By Gregg Larson

RISMEDIA, Jan. 21, 2008-Many of our consulting clients are planning hardware replacements and since most still use Microsoft products, they are asking about the security of the next generation of Microsoft Windows. Here are some key points.

Windows Vista includes many exciting security features, including improved Firewall, Defender, and a Malicious Software Removal Tool. It allows for more organizational control over software installations via Software Restriction Policies. For the more technically minded, one can also download and install security templates from Microsoft that make the computer harder to hack into-but this can take a more technically minded person to do without causing computer problems.

Despite all of these capabilities, Vista does not come thoroughly secured “out of the box.” To get a handle on how to secure Vista, one needs to download, understand, carefully test, and implement the many items described in the Windows Vista Security Guide available from Microsoft at http://technet.microsoft.com/en-us/bb629420.aspx.

One of the security features that comes built in with Vista is called User Account Protection (UAP). It makes you either click “OK” or type a password on endless dialog boxes to do anything that requires administrative privileges. While this feature may work for computers where people don’t do much but surf the Web and read e-mail, it’s infuriating to anyone else, especially actual system administrators, who would likely rather maintain two accounts-one user account and one where they can get work done without all the extra clicks. The biggest problem with this feature is that all these dialogs eventually blur into a “click to get work done” button that nobody bothers to read any more. While this was most likely a good concept, I don’t think this feature was well thought out on the execution side.

Then, there’s Windows Server 2008. The best thing about that operating system is that you can install it for a specific role (e.g. Web, mail, or file server) and only those parts of the operating system needed to fulfill that role get installed or activated. Not only should this make the computer more efficient, but it makes the servers more secure. There are also other useful security features, including fine-grained password policies and easier to use and manage encryption-a must for those who store sensitive information. Note: 35 states currently have breach notification laws. Do you do business in or with anyone in one of them?

Another very exciting Server 2008 feature is Network Access Protection (NAP). NAP monitors the health of computers when they connect or communicate with the network. NAP can check computers running Windows Vista, Windows Server 2008, or Windows XP with Service Pack 3 for firewall, antivirus, and antispyware settings and to ensure that Microsoft Update Services is enabled (so that security patches are downloaded).

Noncompliant computers can be given limited connection to your network and redirected to a site where they can find out how to fix problems.

For those of you actively looking at deploying Windows Server 2008, here’s a security guide for that operating system (OS).

You may also wish to look for the “Changes in Functionality from Windows Server 2003″ document on the Microsoft site.

Hopefully, your company policy ensures that someone is responsible for making sure computers are set up securely and security is maintained. While there’s no such thing as “100% Secure,” if you take advantage of the new features Microsoft is offering through its next generation of operating systems, you can really raise the bar for security and in doing so, protect your clients and you.

Gregg Larson is the CEO of Clareity Security.

For more information, visit www.ClareitySecurity.com.

Want instant access to great articles like this for your blog or newsletter? Check out our 30-day FREE trial of REsource Licensed Real Estate Content Solutions. Need easy stay-in-touch e-Marketing solutions too? Try Pop-a-Note for 99 cents!
Join RISMedia on Twitter and Facebook to connect with us and share your thoughts on this and other topics.




Copyright© 2014 RISMedia, The Leader in Real Estate Information Systems and Real Estate News. All Rights Reserved. This material may not be republished without permission from RISMedia.

Content on this website is copyrighted and may not be redistributed without express written permission from RISMedia. Access to RISMedia archives and thousands of articles like this, as well as consumer real estate videos, are available through RISMedia's REsource Licensed Content Solutions. Offering the industry’s most comprehensive and affordable content packages. Click here to learn more! http://resource.rismedia.com

Our Latest News >>