Nimda: Patch didn't save us

News

Nimda: Patch didn't save us

Cliff Saran
Users are questioning the expensive security measures they deploy against Internet attacks in the wake of Nimda, the multi-pronged worm that hit the Net two weeks ago.

One IT user, working in pre-sales for a large Microsoft solution provider, said that despite having installed costly virus protection, his company's Microsoft systems were still disabled.

The Nimda attack appeared on the morning of Wednesday 19 September. "By Thursday morning almost all of the company's core Microsoft's systems had been affected," he said.

To combat the virus the company was forced to take down its network, causing considerable disruption to business. "On Monday," the user continued, "all our laptops and internal systems were pulled in for inspection, upgraded and virus-checked by a ten-man ISS team."

But even with the latest software patches installed, the virus still appeared to be breaking corporate security, according to a network engineer at another company. "We have been severely affected by the Nimda virus, via a browser that had 24 hours earlier been patched by myself with the so-called Microsoft fix for this threat," he said.

According to the user, the problem for front line IT support staff was that while a business could usefully employ full-time staff upgrading the latest software. He added: "No financial director will justify an IT person doing nothing but maintain software updates all day."

The implication of not having a full-time IT person responsible for updating patches places serious pressure on the IT department, he said. "When trouble strikes, there is a mad rush for upgrades and fixes and questions are raised as to why the upgrades were not applied before."

Microsoft has responded to criticism by maintaining that its ISS products are no more vulnerable to security breaches than others.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy