With most of the civilized world still anxious from the recent hijacked airlines and the even more recent anthrax poisonings, we also need to worry about cyber attacks.
Is there any connection between the burgeoning computer hacking and virus activity and September 11 and its aftermath? The answer to this is not so clear. What is clear is that America's critical information technology infrastructure is being attacked. Though no lives have been lost, huge amounts of money are being wasted trying to ward off and recover from the onslaught.
In 2001, the rate of hacker attacks, attempts to gain unauthorized access to a computer system or its data, is more than double that of the previous year, according to the latest figures from CERT, the government-funded computer emergency group at Carnegie Mellon University.
The cost is particularly high for cleaning up after attacks from viruses and worms malicious computer code often sent through e-mail that can, at worst, destroy all the data on a computer system. The worldwide cost reached $17.1 billion in 2000, a 41% increase over the previous year, according to Computer Economics, an information technology research firm.
Businesses have the most to lose, but individuals are at risk, too. Before last year, despite heavy Internet use, I rarely saw a virus. Lately, I've been subjected to an average of one attack per week, all of which have been thwarted, thus far, by antivirus software and my cautious handling of e-mail attachments.
Nobody has yet established a link between cyber-vandalism such as this and the terrorist attacks on the World Trade Center and the Pentagon. There doesn't seem to be any significant change in malicious Internet activity related to September 11, according to Marty Lindner of CERT. Recognizing the veracity of the threat, however, President Bush created a government panel to look at ways to protect against cyber-terrorism.
Circumstantial evidence indicates that many Internet attacks may be coming from abroad and overseas. A large percentage of the e-mail messages I've received with virus or worm attachments, for instance, appear to originate from those who have only a tenuous grasp, at the very best, of the English language.
One infected e-mail message had a subject line that spelled anthrax as "anthrax." But virus writers like this one are likely piggybacking on the terrorist attacks. These individuals get attention and a feeling of power by stirring hysteria.
It's also been shown that many hacks, viruses and attacks in the past have come from within the United States, so jumping to premature conclusions should be avoided. Xenophobia has its own negative effects.
Regardless of where Internet attacks originate, you need protection. One rule of thumb is to never open an e-mail attachment if you don't know the person it comes from or if you're not expecting it from someone you now. Viruses can trick you into thinking they're legitimate files sent by people you know.
The latest worms, viruses that can spread without human involvement, don't even require you to open an e-mail attachment to do their dirty work. The recent Code Red and Nimda worms exploited vulnerabilities in Microsoft's server software. Microsoft Outlook is another frequent target.
If you're connected to the Internet, you need antivirus software, and as protection against hackers, you need a firewall, particularly if you have a cable modem, DSL modem or are part of a local area network.
The best regarded antivirus program for some time has been the Norton AntiVirus from Symantec. The company also makes an excellent firewall called Norton Personal Firewall and other security programs for individuals and businesses. But an even better firewall program for individuals is ZoneAlarm from Zone Labs.
Businesses sometimes need enhanced protection, and computer security consultants have been quick to respond to post-September 11 security fears. Businesses are expected to act, despite short-term constraints on spending from recession concerns.
The worldwide market for information security services is projected to triple to $21 billion by 2005, an annual growth rate of 25%, according to a recent report from IDC, an information technology research firm. Much of the growth in spending is predicted to take place within small businesses and the financial services sector.
Whatever security approach you take, keep current by installing patches and upgrades as they become available. Also, prepare for data recovery if disaster does strike. Protect yourself from hoaxes as well. Vmyths.com is one of a number of sites that can prevent needless hair pulling.
Reid Goldsborough is a syndicated columnist and author of "Straight Talk About the Information Superhighway." Contact him at email@example.com.