The Need For Basic Internet Security
In order to insure that the connection to the Internet is secure there are some basic methods that can be utilized that are fairly cheap and will more than pay for themselves with the increased security and uptime of the Internet connection. A business does not need to make sure their network is as tight as an Army base; they just need to make sure they are more secure than others so that attackers will target the easier sites and leave theirs alone.
The very first thing that needs to be put in place at each and every Internet connection is a firewall. All businesses should have a hardware firewall that protects and separates their business from the Internet. A cable modem with built-in firewall may be adequate for a household, but a business should look at a commercially available firewall such as a Juniper firewall 5 series, a SonicWall firewall, or even a Cisco SOHO. These are all inexpensive and are easy to manage and configure. A firewall is the first step of protection that keeps out those who do not need to have access to the internal business network. Essentially installing a firewall is similar to installing locks on a house. Only those with the proper keys can access the house just as only those who have been specifically granted access can access the network behind the firewall.
Once a firewall has been installed, configured, and is working properly a business is going to want to look at the computers themselves. There are two things that need to be done on all the machines that will insure that the machines stay up and operational longer than those that are left unprotected. The two things are necessary are: patching the machines for the latest updates for both the operating system (OS) and the applications, and then installing antivirus software.
The patching of the systems will insure that the vulnerabilities that virus/worm writers are using to exploit and take over machines will not be effective against a patched machine. By patching the machine the entry door is closed and the worm will not be able to gain access. Application patches update their tools and software being used on the machine. With the latest patches this too will make it more difficult for attackers to exploit machines and gain entry to them.
Antivirus software is an absolute necessity on machines. System administrators and users can become annoyed with it as it is a resource hog but that is because the software is tasked with protecting the system and they continually scan the system for infections. When used in "real-time" mode each file is scanned before downloading, uploading, or being saved to the disk. This is important when reading emails, sending emails, or even surfing on the Internet.
There are many other steps that can be taken to give a business a stricter security posture. However, by taking the above steps a business can rest assure that they have taken the due diligence and installed the most basic security measures in their business that will make it difficult for an attacker to gain unauthorized access to a business's network.
Related Tags: information security, internet security, firewalls
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Never Undervalue Secure Backups
The Internet can be a very intimidating place. It is full of information, and every day new busi - Lack of Internet Privacy - One Step Away from Identity Theft
Four Reasons to Use Privacy Software Unless you are a spammer, hacker, terrorist, or other such - Site Security Issues Abound
It has happened web wide and it has happened to the best of the best - NASA, DOD, Google, Micros - Online Security: How Secure are You When You Get on the Internet?
Internet technology specialists widely agree that security is becoming the primary concern of th - Software Engineering Standards Providing Industry Integrity
Software engineering is a relatively new career field in technology today in comparison to other - Protect Your E-mail by Obfuscatoin
E-mail harvesting is the process of obtaining lists of e-mail addresses from the internet. This is u - Antispyware Host File - Protect Your Computer Now With This Simple Fix
An antispyware host file is a simple defence mechanism against rogue sites that are out to get you a - What Key Features Make The Best Spyware Removal Programs?
Range Of FeaturesThe best spyware removal programs should combine multiple features so that you get - Online Job Scams and Identity Theft-What Every Job Hunter Needs to Know
There are three main types of common online job scams:1. Phony Job Offers-With this type of scam, In - Spybot Sickness - Spyware Flue
When we talk about spyware symptoms, we talk about both how you get spyware and what the symptoms of
Most viewed articles in this category:
- Parental Control Software - How Will It Help My Family?
Parental Control Software such as Safe Eyes, is a set of tools that allows parents to control what o - Designing IE Exclusive Sites Is Counterproductive And Puts Your Visitors At Risk
Excuse me for being so forthright, but designing a web site exclusively for a specific browser is do - Mind the letters and words in your password.
Radhika Venkata (c).1. Don't choose predictable passwords like asending or desending numbers or lett - Safe Password Tips for Better Computer Security
With so many online accounts to manage, most people tend to use the same password for everything. M - Minimising Credit Card Fraud - For Online Retailers
Well organized criminal organizations steal credit card numbers in many different ways (virus progra - Fraud Prevention Tips
Current areas where mail order, telephone order, and Internet fraud are most prevalent include:* Wes - Money Scams: How to Avoid Getting Ripped Off
Scams take many forms: overseas lotteries, get-rich-quick schemes, work-from-home jobs and hundreds - Protecting Your Websites From Search Engines
There are a great number of scenarios in which you should be protecting your websites from the searc - The Best Internet Privacy Software
Detect, Protect, Dis-infect, Reject, Delete, then - RepeatThe best internet privacy software isn't a - The Most Effective Spyware Removers
There are a number of things you need to look for when you are seeking the most effective spyware re