(619) 804-2230

Direct Phone

San Diego

Service Area


Jet Legal Technologies

Security Services

Securing and operating today’s complex systems is challenging and demanding. Mission and operational requirements to deliver services and applications swiftly and securely have never been greater.   The nature of network security and infrastructure vulnerability has changed dramatically over the past decade and the complexity of technology will only continue to expand creating a more challenging and dangerous situation for data compromise.

Jet Legal Security Service

E-Security.com's Top 10 Enterprise Vulnerabilities

  • Email Attachments — Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution of viruses means that they can propagate themselves even without a user double-clicking on them.
  • VPN Tunnel Vulnerabilities — A hacker who worms his way into the VPN has free and easy access to the network.
  • Blended Attacks — Worms and viruses are becoming more complicated, and now a single one may be able to execute itself or even attack more than one platform.
  • Diversionary Tactics — Hackers may strike a set of servers in a target company and then when security administrators are busy putting out that fire, they slip in and attack another part of the network.
  • Downloads from Web Sites — Workers frequently misuse their Internet access in the workplace, downloading games, movies and music and even porn. It opens the network up to attack and sucks up valuable bandwidth.
  • Supply Chain and Partners Added to the Network — An administrator may grant access to the network for a partner company and then forget to close that access point when the job is over. The same applies to employees who are leaving the company.
  • Microsoft’s SOAP — The Simple Object Access Protocol (SOAP) doesn’t have security specifications built into it, warns Silent Runner’s Woolley.
  • Renaming Documents — An employee could save business-critical information in a different file, give it a random, unrelated name and email the information to her home computer, a friend or even a corporate competitor. Monitoring software that checks emails leaving the company might fail to pick up on the outgoing message if the subject name has been changed.
  • Peer-to-Peer Applications — In a peer-to-peer environment there is an implied trust between servers. That means if a user has access to one server, he automatically has access to another if the servers share trust. Woolley points out that hackers or rogue employees can gain access to one server and move freely throughout the network.
  • Music and Video Browsers — These are browsers that automatically will connect the user with related web sites — all without the user’s permission. A music browser, for instance, may note that the user likes jazz so will connect the user to other jazz sites and executable applications, putting the network at risk and potentially using up huge amounts of bandwidth.

Learn More About
Our Services

Untangle Your Wired World