Skip to main content

Computer Security : Part - C

How to Keep Our Business Computers and Online Information Secure:

Following important things we can do to make our business computer (and DATA) more secure. While no individual step will completely eliminate our risk, together these practices will make our business computer’s defense strong and minimize the threat of malicious activity.

Conduct A Security Audit:

If we don’t know what parts of our business are vulnerable or what data we have that needs to be protected, we can’t properly secure it. It is critical that we work with a professional to audit our entire IT infrastructure computers, network, and mobile devices—to determine what we need to do to prevent hackers from accessing our network.

Secure Our Hardware:

Of the Seattle-area companies that were hacked, more than 40 had their physical premises broken into by burglars who grabbed electronic equipment. In one case, the gang snatched more than $300,000 in servers, laptops, cell phones and other items. Security cameras recorded those using handcarts to haul loads of equipment to a van over a four hour span.

For burglars who are not scared off by security alarms and motion detectors, physically locking down computers makes their job tougher. Few people feed a cable through their computer's Kensington lock port (the small metal loop found on most laptop and desktop devices) to secure it to their desk. Sure, they're relatively easy for a thief to circumvent, but the extra effort could tip the odds in our favor. "That little bit of time is something criminals usually don't want to take," Cullen says. "Time is the enemy for anyone breaking into a physical premise."

Make network storage safer by using Kensington locks or employing more robust solutions, like rack-mounting hardware and keeping server room doors closed and locked. Vancouver, Wash.-based CRU-Data Port makes several servers that can be secured with locks, USB security keys and even hardware-based encryption, ensuring that if drives are stolen, they will be unusable to the thieves.

There's also tracking software--important if our business runs on mobile laptops in the field. The tracking firm Prey uses a variety of methods to locate anything from a cell phone to a server, password-securing the machine if it goes missing and even snapping and sending pictures of the thief if the stolen device has a webcam. Low per-month rates make the small, covert program a must-install for any device that can access business data and company networks.

Update Our Computer Operating Systems:

Manufacturers upgrade security safeguards often. Sign up for the automatic updates that install security patches. Hackers often are on the lookout for systems that don’t have the latest safeguards. And look into anti-virus software, again with automatic updates. Software should also be put in place to block spam and detect spyware, the programs that can be surreptitiously installed from outside a computer system and feed sensitive information to the intruder.

Lock Our Network:

Many hacking victims are compromised via Wi-Fi networks, through a technique called "wardriving". In cars outfitted with high-powered antennas, hacker gangs drive around cities, scanning for unlocked or poorly protected networks. Once a vulnerable Wi-Fi hot spot is found, the crooks are as good as in the company's front door, scouring machines on the network for passwords and financial data.

The best defense against exploits like wardriving is to have no wireless network at all. Wired networks, while less versatile, are more secure, because users have to access them by either plugging into physical outlets or hacking modem ports. But if our company must have a wireless network, disable the service set identifier (SSID) broadcasting function on the wireless router. This creates a cloaked or hidden network, invisible to casual Wi-Fi snoops and accessible only to users with the exact network name. Small businesses like coffeehouses can also do this just periodically change the network's information and place a small sign near the register with the current network name and pass code.

If we're using Wi-Fi, update it to the latest encryption standard. Some Seattle wardriving victims had enabled Wired Equivalent Privacy (WEP), an easily cracked algorithm that fell out of favor almost 10 years ago, and thought their networks were secure. WPA2, the current standard, has a longer encryption key that is more difficult to break into. To make our data even safer, create a nonsense password with numbers, special characters and capital letters. Says Cullen, "They'd need a computer working on it for a million years to crack the code."

Install Anti-malware And Anti-virus Protection:

When wardrivers are successful in cracking a wireless network, they can log in and infect connected computers with malicious software or viruses. But it doesn't take a Wi-Fi connection to plant this software; spam e-mails and harmful websites push it to computers all the time, and if the efforts are successful, the malware can install code that runs in the background, capturing keystrokes and login information and relaying it to the hackers. According to Verizon's study, malware was used in nearly half of data breaches in 2010 and was responsible for almost 80 percent of records stolen.

"That's probably the No. 1 money-generating technique the bad guys use," SANS Institute's Spitzner says. "Anytime you visit any type of website that requires a login and password Facebook, your bank, payroll, whatever--malware will harvest your information and send it to the bad guy," he says. "The bad guy will turn right around, log in as you and do all his evil stuff."

Most malware is installed through network security hacks, but being vigilant about cybercrime is as much about anticipating tomorrow's threats as it is defending against todays. E-mail phishing, spoofing and apps that access social media accounts are popping up with increasing regularity. Loading anti-malware and anti-virus protection on our machines--that goes for mobile devices as well and running it after every software install can help ensure these threats don't take. Also, keeping programs and hardware up to date from upgrading to newer routers and computers to immediately installing browser updates blocks malicious worms that thrive in older equipment and out-of-date software.

» » » To continue reading, Click here corresponding: A, BC and D.

US-CERT (from Carnegie Mellon University):
Small Business Computing:
Small Biz Technology:


List of Popular Posts

Write a dialogue between two friends about the uses and abuses of Internet

Write a dialogue between two friends about the uses and abuses of Internet.

Dialogue:A dialogue between two friends (Lina & Mina) the uses and abuses of Internet.

Lina: Hi! How are you, Mina?
Mina: Fine and you?

Lina: I'm also fine. Where are you going now?
Mina: I'm going to the cyber cafe. I will have to submit an application via internet.

Lina: Oh I see. I will be very glad if you kindly tell me something about the uses of Internet.
Mina: Internet is a computerized network of information. Internet allows us to meet new people and discover new places even though we are not there. With the help of internet, we can get information about new books, movies, latest news, music, medicine, invention and can send mail electronically to any part of the world.

Composition:Uses and Abuses of Internet
Lina: How does it work in the field of education?
Mina: With the help of Internet we can get foreign education. A student no longer needs to spend long hours in libraries searching for a desired…

Write a dialogue between two friends about the proper use of time

Suppose, You are Lina and Mina is you best friend. Now, write a dialogue between you and Mina about the proper use of time.

Dialogue: A dialogue between two friends (myself: Lina and my friend: Mina) about the proper use of time.

Lina: Hello Mina, how are you?
Mina: I'm not well.

Lina: Why! What happened?
Mina: My results of the HSC pre-test examination are not good.

Lina: What's the problem? Didn't you learn your lessons regularly?
Mina: No, I was not serious in using time properly and very often I wasted my valuable time on Facebook.

Lina: Oh, God, you are sure to fail in the HSC Examination.
Mina: Please tell me what I can do.

Lina: You must be sincere about your time. If you utilize of your time, you are sure to succeed.
Do you know about the benefits of using time properly?
Mina: Oh, no. I don't.

Quick navigation:Write a dialogue between two friends about national poet Kazi Nazrul Islam
Lina: All the great men of the world had made the proper use of time. They were very sincer…

Write a dialogue between two friends on environment pollution

Dialogue about environment pollution.Karim: Good morning, Rahim?
Rahim: Good morning.

Karim: How are you, friend?
Rahim: I am fine and you?

Read:Write a dialogue between  two friends about the cause, effect and possible suggestion of remedy for drug addiction.
Karim: I am also fine. But why do you look so worried?
Rahim: You are right. I am somewhat worried about environment pollution.

Karim: Oh, Yes! Environmental pollution is one of the biggest problems the world faces today. It is being polluted day by day.
Rahim: You are absolutely right. This polluted environment causes much harm to us.

Karim: Exactly! But what are you thinking about its consequences?
Rahim: The consequence of environmental pollution is an issue that troubles us economically, physically and everyday of our lives.

Karim: Absolutely! Besides, the increase of world temperature is the result of environment pollution. What is your idea about it?
Rahim: I agree with you. I think the plants and animals are likely to be extinct…