StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Who Is Minding the Security Store - Essay Example

Cite this document
Summary
An antivirus software update from McAfee failed on April 20th, 2010. This led to numerous computers running Windows XP to either reboot continuously or crash. The update reversed the activity of the antivirus software by turning it against Microsoft Windows vital components, rather than against malicious software (Harkins 70)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Who Is Minding the Security Store
Read Text Preview

Extract of sample "Who Is Minding the Security Store"

Who is Minding the Security Store? An antivirus software up from McAfee failed on April 20th, This led to numerous computers running Windows XP to either reboot continuously or crash. The update reversed the activity of the antivirus software by turning it against Microsoft Windows vital components, rather than against malicious software (Harkins 70). The damage caused by the antivirus update was widespread. Michigan University’s medical school was hard hit, for example, with reports of eight thousand computers crashing.

While the update was meant to detect the W32/wecorl.a virus, which was a minor threat, and destroy it, it went rogue and attacked the svchost.exe file that is critical for Windows XP SP3. It quarantined the file and removed it and, in some cases, totally deleted it. Without the file, computers running on Windows were unable to boot properly. After updating their McAfee antivirus software, the machines booted repeatedly or crashed. Some lost the capability to connect to the internet, while others lost ability to use the USB drive.

The latter problem made it even more difficult to reinstall the svchost.exe from another computer (Harkins 70). Personal computers that ran Windows XP SP3 were all affected, while those running SP2, SP1, Windows 2000, Windows 7, and Vista were not affected. The problem with the McAfee updates came from DAT 6807, as well as the subsequent DAT 6808, which was dependent on the client’s product in use (Harkins 71). McAfee offered two solutions to the problem, both of which needed the clients update the DAT 6809 file that they released later.

One of the solutions involved the users without internet connectivity uninstalling the McAfee antivirus software, rebooting their machines, downloading another update version from the company’s website and installing the update. The second solution had to do with manual and automatic updating methods for existing DAT 6809 updates. If the user continued to have problems following the DAT version update, they were advised to use the McAfee Consumer Product Removal tool to uninstall it, followed by installment of their updated product version (Harkins 71).

In addition, McAfee also reimbursed their clients for reasonable expenses that resulted from the faulty update. This was offered to home office clients that were impacted and had incurred costs related to PC repair due to the update problem (Harkins 71). In addition, the reimbursement also covered repair measures and tech support specialist visits. The reimbursement was necessary in minimizing the fallout with the public that was occasioned by issues caused by the faulty update. Finally, they also sent recovery CDs to their clients through express delivery, while also extending their subscriptions with McAfee for an additional two years free of charge (Harkins 72).

It took McAfee some fourteen hours following the first report of malfunction to post an announcement about it. The first announcement, made by an unidentified spokesman, only made a reference to the problem and gave the affected clients a way to uninstall the antivirus software and install a new version. Later, Barry McPherson, who was McAfee’s Executive Vice President, made another announcement. However, it took more than forty-eight hours for the company’s public relations department to craft a statement that was given by Barry McPherson (Harkins 76).

McAfee definitely could have handled the problem better from a public relations point of view. Their dithering in offering what could pass as an apology allowed its European competitor Sunbelt to pounce and direct McAfee clients to their website from which they could install their product free and retrieve data. It was only three days after the update malfunction that McAfee offered a detailed apology for the problems and, by then, enough damage had already been done. Considering how sensitive the issue was and the types of clients that McAfee had, the PR department should have involved from the beginning in reducing the fallout.

However, their offer of reimbursement for reasonable expenses went some way in reducing the fallout. However, while McAfee was able to arrest the situation with relative speed, the communication of the malfunction was more damaging than the malfunction (Harkins 76). There are various things that organizations can do in order to protect themselves from fallout in such situations. For example, they could contract a hosted vendor who will provide invaluable services. Growing and established companies, sometimes, can find it very difficult to keep up with technological advances and software updates are one such instance (Harkins 77).

Rather than allowing IT requirements to limit the organization’s potential, it is best to partner with hosted solutions vendors. In this case, the organization must ensure that the vendor is experienced in every aspect of information and data maintenance. Experience includes system components that are tolerant to faults, data redundancy in dual locations, processes and systems of data recovery that are sensitive to risk, technical and monitoring support applications that are active 24/7, and a tiered process of software quality assurance.

Hosted solutions will let the companies use sophisticated functionality sans investments and complexities that they need to implement them. While the hosted solution provider keeps a close look on the company’s information system security, the company can focus on their core competencies (Harkins 77). Work Cited Harkins, Malcolm. Managing Risk and Information Security: Protect to Enable. New York: Apress, 2013. Print

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Who Is Minding the Security Store Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Who Is Minding the Security Store Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1487244-who-is-minding-the-security-store
(Who Is Minding the Security Store Essay Example | Topics and Well Written Essays - 750 Words)
Who Is Minding the Security Store Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1487244-who-is-minding-the-security-store.
“Who Is Minding the Security Store Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1487244-who-is-minding-the-security-store.
  • Cited: 0 times

CHECK THESE SAMPLES OF Who Is Minding the Security Store

Two Financial Giants Merge

The paper ''Two Financial Giants Merge'' tells that The common practice of integration on the emergence of two organizations is meant to complete ad-hoc aims via the formation of links in the short term between the systems of the two companies.... The two companies, the majority are created between control and process components....
7 Pages (1750 words) Essay

Wells Fargo and Wachovia Merge

1.... Two Financial Giants Merge Two financial giants, Wells Fargo and Wachovia merge, with a $15 billion acquisition of Wachovia by Wells Fargo.... With the two companies previously having been financial giants, the result was the second biggest bank in the United States.... hellip; Mergers occur from either two firms that are of the same size coming together with the aim of strengthening themselves, thus acquiring a competitive advantage over other firms in the industry....
6 Pages (1500 words) Assignment

Data Fusion and Data Mining

The paper begins with the statement that at a period when computer technologies are very vital tools to business, every new and emerging technology to gain better market share.... One of the fertile areas in computer science that marketers want to exploit is the area of data collection and management....
5 Pages (1250 words) Research Paper

Information securtiy

This corporate information is the most crucial asset of a company and is at stake if proper measures are not taken to deter the security attacks.... First part deals with a general discussion about information security.... An introduction is given as to what information security… Then, the importance of designing an information security policy has been discussed.... Information security in different fields has been considered....
12 Pages (3000 words) Essay

The impact of mobile devices on Cyber Security

The proposed study "The impact of mobile devices on Cyber security" reveals the potential interaction between mobile devices and Cyber security.... The topic can be also related to the Criminal Justice in the following way: the violation of Cyber security has a series of legal consequences for the violator.... The proposed topic has been developed in the context of a research developed in regard to Cyber security.... As an aspect of the IT discipline, Cyber security is highly analyzed through existing literature....
4 Pages (1000 words) Research Proposal

Why do People Store Large Amounts of Personal Information

… The paper "Why do People store Large Amounts of Personal Information and what do they do with this information?... In this paper, we endeavor to identify the reasons as to why the people store information and keep large amounts of data.... The paper "Why do People store Large Amounts of Personal Information and what do they do with this information?... In this paper, we endeavor to identify the reasons as to why the people store information and keep large amounts of data....
11 Pages (2750 words) Assignment

Data Warehouses, OLAP, and Data Mining

The dimension table and the fact table association are depicted through the following diagram which depicts the star schema for a sample retail store.... The fact table is titled store sales, while the store, payment type, time, product and customers are dimension tables....
8 Pages (2000 words) Assignment

A Security Evaluation of Personal Information Management

The major aim of this paper will thus be to carry out an exhaustive evaluation of the security of all personal information stored in the named devices with a view of establishing the level of informational security and the extent to which the information is susceptible to access by unauthorized personnel.... … The paper "A security Evaluation of Personal Information Management " is a worthy example of a term paper on information technology.... The paper "A security Evaluation of Personal Information Management " is a worthy example of a term paper on information technology....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us