{"id":1298,"date":"2014-01-08T09:32:24","date_gmt":"2014-01-08T15:32:24","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1298"},"modified":"2015-04-24T16:47:15","modified_gmt":"2015-04-24T21:47:15","slug":"keeping-cybercrime-out-tips-on-network-security","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/keeping-cybercrime-out-tips-on-network-security\/","title":{"rendered":"Keeping cybercrime out &#8211; tips on network security"},"content":{"rendered":"<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/DC3_seal.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"DOD Cyber Crime Center\" class=\"alignleft size-medium wp-image-1332\" height=\"174\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/DC3_seal-300x294.jpg\" style=\"margin-right: 20px;\" title=\"DOD Cyber Crime Center\" width=\"179\"><\/a><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Threats to network security are greater today than they\u2019ve ever been. From botnets to spies, everyone\u2019s trying to get access to your system and its data. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Among the biggest threats to networks are basic spyware and adware, denial of service attacks that can choke entire systems and bring them down, direct attacks by hackers and identity and data theft. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Then there's the enormous amount of malicious code out there known as viruses, Trojan horses and worms, all chipping away and looking for vulnerabilities so they can get in and unleash a tremendous amount of harm. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">If that wasn't enough, there's also a range of network cripplers called zero-hour or zero-day attacks, all designed to cause mayhem. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Understandably, there isn't a one-shot cure-all to this long list of threats to network security. There is no one program that network administrators can load up that will offer total protection. Rather, just as with some human diseases that are difficult to treat, a multi-pronged approach is required to neutralize the threats. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">That means starting with the basics: solid, robust antivirus and antispyware programs, such as <\/span><u><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;\"><a href=\"http:\/\/www.wickhill.com\/products\/vendors\/detail\/20\/Kaspersky\" rel=\"nofollow\" target=\"_blank\"><span style=\"color:#0000CD;\">Kaspersky<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/u><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">, that are as up to date as possible because new threats emerge almost daily. Updating your antivirus software last week may not prevent your network from becoming infected by a new virus let loose tomorrow. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Just as most computers have firewalls automatically installed on their operating systems, with the default setting of \"on\", networks themselves need to have their own firewall, to prevent access to the entire system. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">More sophisticated solutions for thwarting attacks include Virtual Private Networks; these are more secure and provide connections through the internet. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Network administrators might also want to install intrusion prevention systems that will quickly detect and prevent incoming attacks.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Other steps that can be taken to secure networks include scheduling regular backups of data, so that in the event that the system is attacked, valuable data will not be corrupted or lost. <\/span>\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/256px-Wireless_tower.svg_.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Wireless Network Security\" class=\"alignleft size-full wp-image-1344\" height=\"144\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/256px-Wireless_tower.svg_.png\" style=\"margin-right: 20px;\" title=\"Wireless Network Security\" width=\"122\"><\/a><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">If a part of the network is wireless, make sure that the connections are secure with strong passwords so that they cannot be easily accessed. The signals carry way beyond the office space and show up on computers and other devices of those who may be intent on causing harm. One may try to log on so that they can enter the network and upload malware or snoop around. <\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Always ensure staff are properly trained in security measures and are aware of the persistent high threat of attack. That means, for example, if there are links in emails that staff are unsure of, do not click them. Similarly, request that data are sent in the body of an email instead of in an attached file, which if malicious would unleash destructive code to the computer and possibly from there spread right through the system.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: medium; color: #3b3b3b;\">Taking proactive steps to secure networks, and always remaining vigilant, will ensure that you\u2019re as well protected as possible and therefore vastly reduce harmful disruptions to the business.<\/span>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\t<span style=\"color:#696969;\"><span style=\"font-size: 10px;\"><em>Cover Image Credit: By Rurik at en.wikipedia (Transferred from en.wikipedia) [Public domain], from Wikimedia Commons<br>\n\tImage Credit: Burgundavia [GFDL (http:\/\/www.gnu.org\/copyleft\/fdl.html) or CC-BY-SA-3.0 (http:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/)], via Wikimedia Commons<\/em><\/span><\/span>\n<\/p>\n<p>\n\t\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threats to network security are greater today than they\u2019ve ever been. From botnets to spies, everyone\u2019s trying to get access to your system and its data. Among the biggest threats to networks are basic spyware and adware, denial of service attacks that can choke entire systems and bring them down, direct attacks by hackers and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,8],"tags":[],"class_list":["post-1298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1298"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1298\/revisions"}],"predecessor-version":[{"id":3543,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1298\/revisions\/3543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1332"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}