SHARE
Facebook X Pinterest WhatsApp

Firewalls, Patches and Updates. Oh My!

Microsoft products, chief target of every deranged real and would-be hacker, have many vulnerable holes. This year large companies and government agencies became collateral damage when hormonal driven hackers set about to flex muscles. Over one and a half a million computers fell prey to viruses and worms. Lost productivity was measured in the billions. […]

Written By
thumbnail Cheryl Currid
Cheryl Currid
Dec 18, 2003
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Microsoft products, chief target of every deranged real and would-be hacker, have many vulnerable holes. This year large companies and government agencies became collateral damage when hormonal driven hackers set about to flex muscles. Over one and a half a million computers fell prey to viruses and worms. Lost productivity was measured in the billions.

But big problems usually mean big opportunities. These issues are understood by customers and they need help executing solutions—software patches and products that scan for vulnerable areas. For those who can put together the brain-power and tools, today could be a great day to start selling vulnerability assessments and regular follow ups.

Look at the warnings that came before the “Blaster” virus. Microsoft knew about the problem and on July 16th published a fix for the vulnerability. The software company reported that about 40 million users downloaded the patch during the first two weeks of August. Unfortunately, millions more failed to do so. They and their problems made history along with accused perpetrator Jeffrey Lee Parson (aka TeeKid).

According to court papers Parson, a high school student, took an original virus, changed it slightly, and unleashed it. The virus taunted Microsoft’s chairman: “Billy Gates why do you make this possible? Stop making money and fix your software!!.”

By August 19th Parson’s home was raided and seven computers seized. By law enforcement standards the arrest showed fast timing, but by “Internet-time” it left millions of computer users unprotected. Remembering back to 2001, it took only five hours for the Anna Kournikova virus to spread around the world.

Now back to that business opportunity I was talking about.

Customers may be ready for a babysitter – a security baby sitter. Sure there are lots of virus checkers, and warnings of virus threats get a fair share of air time. But business people need to be actively involved in their professions, not acting as computer police on guard for hack-attacks.

Sure, there are automatic ways to protect a company’s network but there are still too many unguarded doors. Consider that Microsoft already has a Software Update Server (SUS) which distributes every patch to IT systems. It’s a great idea, but not widely implemented or well used. And while the free upgrade to SUS 2.0 is planned for next spring, I doubt it will resolve the problem.

The same goes for Enterprise protection software. Symantec’s excellent Enterprise Security Manager System performs more than 2,000 specific security checks to make sure mission-critical information systems comply with an organization’s security policies. The problem is: Who sets up those policies in the first place? And who keeps them current? Do the policies, checks and controls get monitored. I know of many cases where security tools were installed but never monitored and maintained to make sure the tools were kept working.

Hence, the business opportunity. Hire a security brain, then rent out the brain-power. This could be a great way to get new business off the ground.


Cheryl Currid is the president of Currid & Company, a high-tech research company based in Houston, TX. She has published several books and hundreds of articles on computer technology and the Internet. Her Cheryl Currid’s Technology Report airs every Saturday at 5:00 PM and Sunday at 7:30 AM in Houston on KTRK-TV, Houston’s ABC Station.

Recommended for you...

Scale Computing Makes Strategic Updates to HyperCore Solution
Jordan Smith
Sep 17, 2025
Druva Launches Metadata Graphing & New Agentic AI Solutions
Jordan Smith
Sep 17, 2025
SonicWall’s Michael Crean on State of Managed Security
Victoria Durgin
Sep 17, 2025
Gigamon Unveils Agentic AI App to Boost IT Productivity
Luis Millares
Sep 16, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.