The Anonymous Widower

Protecting Your Company, Organisation Or Workgroup From Viruses, Ransomware And Other Malware

I am not a computer malware expert and since 1970, I have generally worked alone, with one or more computers , not connected by a network.

But after all the problems of the last few weeks with ransomware, I feel that one of my experiences of a few years ago, should be put into this blog.

A Daisy Demonstration

The Research Department of a major corporation were interested in using my software; Daisy to analyse data being collected in their local offices.

So I was summoned to their offices to the South West of London, so that they could have a proper demonstration.

I found something extremely sensible that I’d not seen before.

The Department had the usual corporate network, as you would expect, with logins, malware protection, but for my demonstration I used another computer.

The Lonely PC

We moved to a lonely PC sitting on a desk in the corner. It had the following characteristics.

  • Adequate power.
  • A recent version of Windows.
  • Direct connection to the Internet through a landline.
  • No connection to the main network.
  • A directly connected printer.
  • A selection of browsers.
  • Microsoft Office, but no e-mail program.

The only thing, that the computer lacked was a large screen.

Uses Of The Isolated Computer

The isolated computer was used for the following.

  • Demonstrations
  • Checking out ideas and web sites in suspect locations.
  • Testing software.

I think that after the recent ransomware attacks, emergency Internet access could probably be added to the list of uses.

Rules For Using The Computer

The Department had setup a series of rules for the use of the computer.

  • The computer could be booked by anybody in the Department.
  • Comprehensive data transfer rules using physical devices had been setup.
  • No software could be installed on computers on the main network, without full testing on the isolated computer.
  • The computer was regularly checked for any viruses or malware.
  • If any nasties were found on this computer, it was immediately restored to a pristine state.

Incidentally, whether it was for my benefit or not, it was one of the cleanest corporate computers, I’ve used for a demonstration.

Benefits

I was told that since the computer had been installed, malware problems on the network had decreased.

But how much was this down to a constantly improving and rigorously updated malware-protection system for the Department’s main network?

An Ideal System

A lot would depend on the type of company and their needs.

The system I used needed a big screen, as often a demonstration needs to be seen by several people.

I also think, that with a large screen, it could be a valuable tool in Corporate Communications.

Some might think, that this type of computer, which bypasses the corporate network, could be used by those with access for nefarious purposes.

Years ago, my software; Artemis was used to do the Project Management on Chevaline. The Ministry of Defence was worried that the Russians might use some unknown technology to read the electromagnetic radiation from the cathode-ray tube of the VDU. So I suggested they put the desk-sized computer in a shielded internal room. But what about the door, they said! I suggested that they get Chubb to put one of their best locks on the door.

A few weeks later, when a software problem struck, I went home with a complete copy of the project on a disc.

I had encoded the data using a personally-designed method that I still believe is unbreakable. But that is another story! Especially, as I’ve never signed the Official Secrets Act!

As this tale illustrates, there are ways to enforce security and holes will always appear.

 

 

 

May 18, 2017 Posted by | Computing | , , , , | Leave a comment