Home Sitemap Contact
We will make our resources
work for you!   Contact Perivue
What are you waiting for?
Getting approved is Easy !

Tech Tips:


Tips and Tricks for Secure Computing


Use Cisco Intelligent Firewall and Keep your Software Current.  This is especially and obviously important with businesses, but many people have firewall settings that are loose and not well defined. Revise your firewall settings and keep tab on who has access to your company firewall and how often they make changes. Make sure the firewall has the latest software running, as malicious codes are constantly exploited by hackers. Cisco always posts latest code vulnerability updates at the following site: http://www.cisco.com/en/US/products/products_security_advisories_listing.html
Contact Perivue to inquire about Cisco's Adaptive Security Device (ASA)!

Deploy Anti-Spam & Anti-Virus Solution.  There are many ways your company can be the target of spam or virus attack. You should deploy a Spam/Virus security system to keep malicious visitors or email-spam from penetrating into your network. Perivue Networks uses and recommends Barracuda Networks Spam/Virus Firewall which offers great control and management tools that keep your company in safe zone and provides close to 100% Spam protection!!!
Contact Perivue for a LIVE Spam Firewall Demo!


Secure your wireless networks.  WEP security is the most widely deployed security mechanism in computers today.  But it doesn’t work!  That’s right WEP security has been compromised, for years.  Hackers know that the password and authentication keys are embedded in the encrypted packets of data transmitted over a wireless network using WEP.  The hackers have access to simple tools that read the embedded information thus granting them easy access to your network.  WPA2 is a much more secure mechanism for securing your wireless network.  Also if you broadcast the SSID of your wireless network, you have just provided one factor of the login process, now the hacker just needs to run his freeware hacking tool to get your password, and they’re in.
Contact Perivue for secure wireless solutions from Cisco


Deploy Network Admission Control.  So you have passwords enabled, you have a firewall, and you have anti-virus software running on your systems, so your network is totally secure right?  Not necessarily.  Albeit these systems are important, travelling sales staff, executives on the road and guests on your network have more susceptibility than the desktop computers that never leave the office.  Network Admission Control can scan your guests and remote users for malware before allowing access to internal resources.  Some sophisticated forms of Network Admission Control can even allow quarantined access and get your network users updated before granting access to sensitive and private systems.  Despite the associated costs, larger network environments save money by reducing outages and interruptions by limiting network access to secure and compliant users only.


Install remote-wipe technology.  Some (but not all) smart phones, laptops and mobile devices have the ability to be wiped clean in the event that they are lost.  If this is an option with your devices, install and enable the technology.  We are imperfect people living in an imperfect world, in the event that your cell phone, PDA, laptop, or notepad computer is lost or misplaced, you may have the ability to initiate a remote-wipe and prevent access to your confidential data.


Use “smart” passwords.  Using words and names that are common, as passwords, is almost equivalent to no password at all in today’s computing world.  Dictionary algorithms and other brut force hacker-tools that incorporate commonly used words can walk right through the proverbial door secured with weak passwords.  Be sure to include uppercase and lower case characters, non-alpha-numeric characters and difficult to remember schema to create stronger passwords.  Many popular web sites and your company’s security policy will likely require you to use strong passwords before getting started.

Don't forget to change passwords for inactive employees.  IT Administrators often forget to change passwords they have given to employees that no longer work for your company. Make sure to either de-activate their account or change their passwords used to access your network. You also need to change or de-activate their accounts used to access online web applications or sites - otherwise they'll be accessing those sites without your knowledge!!!


Avoid un-safe web pages.  Web pages with free content, sexual content or content otherwise deemed inappropriate are some of the largest purveyors of malware, viruses, worms, botnets and other malicious code.  There is no moral judgment here on behalf of the author, but it is well known that many sites containing improper pictures often contain malicious code and software.  Plus browsing these sites at work will simply get you fired, sued, or possibly worse.