FBI probes hacking incident at Indiana clinic

13.02.2006

Locating back doors built into enterprise software can be difficult, said Pete Lindstrom, an analyst at Spire Security LLC in Malvern, Pa. Lindstrom noted that IT and security managers can take measures to mitigate the risks posed by back doors, such as monitoring systems at the database and application levels, validating the nature and integrity of database queries, and tracking user activity.