Use Cisco
Intelligent Firewall and Keep your Software Current. This
is especially and obviously important with businesses, but many
people have firewall settings that are loose and not well
defined. Revise your firewall settings and keep tab on who has
access to your company firewall and how often they make changes.
Make sure the firewall has the latest software running, as
malicious codes are constantly exploited by hackers. Cisco
always posts latest code vulnerability updates at the following
site:
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
Contact Perivue to inquire about
Cisco's Adaptive Security Device (ASA)!
Deploy Anti-Spam & Anti-Virus Solution.
There are many ways your company can be the target of spam or virus attack. You should
deploy a Spam/Virus security system to keep malicious visitors
or email-spam from penetrating into your network. Perivue
Networks uses and recommends Barracuda Networks Spam/Virus
Firewall which offers great control and management tools that
keep your company in safe zone and provides close to 100% Spam
protection!!!
Contact Perivue for a LIVE Spam Firewall Demo!
Secure your
wireless networks. WEP security is the most widely deployed
security mechanism in computers today. But it doesn’t work!
That’s right WEP security has been compromised, for years.
Hackers know that the password and authentication keys are
embedded in the encrypted packets of data transmitted over a
wireless network using WEP. The hackers have access to simple
tools that read the embedded information thus granting them easy
access to your network. WPA2 is a much more secure mechanism
for securing your wireless network. Also if you broadcast the
SSID of your wireless network, you have just provided one factor
of the login process, now the hacker just needs to run his
freeware hacking tool to get your password, and they’re in.
Contact Perivue for secure
wireless solutions from Cisco
Deploy
Network Admission Control. So you have passwords enabled,
you have a firewall, and you have anti-virus software running on
your systems, so your network is totally secure right? Not
necessarily. Albeit these systems are important, travelling
sales staff, executives on the road and guests on your network
have more susceptibility than the desktop computers that never
leave the office. Network Admission Control can scan your guests
and remote users for malware before allowing access to internal
resources. Some
sophisticated forms of Network Admission Control can even allow
quarantined access and get your network users updated before
granting access to sensitive and private systems. Despite the
associated costs, larger network environments save money by
reducing outages and interruptions by limiting network access to
secure and compliant users only.
Install
remote-wipe technology. Some (but not all) smart phones,
laptops and mobile devices have the ability to be wiped clean in
the event that they are lost. If this is an option with your
devices, install and enable the technology. We are imperfect
people living in an imperfect world, in the event that your cell
phone, PDA, laptop, or notepad computer is lost or misplaced,
you may have the ability to initiate a remote-wipe and prevent
access to your confidential data.
Use “smart”
passwords. Using words and names that are common,
as passwords, is almost equivalent to no password at all in
today’s computing world. Dictionary algorithms and other brut
force hacker-tools that incorporate commonly used words can walk
right through the proverbial door secured with weak passwords.
Be sure to include uppercase and lower case characters,
non-alpha-numeric characters and difficult to remember schema to
create stronger passwords. Many popular web sites and your
company’s security policy will likely require you to use strong
passwords before getting started.
Don't forget to
change passwords for inactive employees. IT
Administrators often forget to change passwords they have given
to employees that no longer work for your company. Make sure to
either de-activate their account or change their passwords used
to access your network. You also need to change or de-activate
their accounts used to access online web applications or sites -
otherwise they'll be accessing those sites without your
knowledge!!!
Avoid
un-safe web pages. Web pages with free content, sexual
content or content otherwise deemed inappropriate are some of
the largest purveyors of malware, viruses, worms, botnets and
other malicious code. There is no moral judgment here on behalf
of the author, but it is well known that many sites containing
improper pictures often contain malicious code and software. Plus
browsing these sites at work will simply get you fired, sued, or
possibly worse.
|