Did anyone watch 4 Corner’s episode “Fear in the Fast Lane” on the ABC, 18th August 2009.
Here’s a link to the Transcript in case you missed it.
http://www.abc.net.au/4corners/content/2009/s2658405.htm
Apparently, the rollout of the Government’s new hyper fast internet cable will open the gates to increased hacker activity allowing them to do their dirty work a lot faster.
Are you vulnerable to cyber crime?
Is your internet security up to date?
How secure is your Wireless Network?
Wireless networks must implement security configurations, including anti-virus software and automatic security patch installation on set up.
Many networks become vulnerable to hacker break-ins if you don’t properly configure and maintain your security system.
If any part of your computer network is listening for and accepting outside connections. Remote logins, file sharing, web hosting, and FTP serving, among others, there is a risk a hacker could connect to your computer and steal sensitive data.
This risk is reduced by running a “firewall” – a special computer or network router that filters incoming traffic. Without proper configuration, a firewall can often become worthless.
Network Firewalls are configured to block incoming traffic to vulnerable services on normal workstations. However, if a hacker is able to penetrate one computer on the network, he can then launch attacks from inside the network and bypass the firewall. This is a particular problem with laptops that connect to multiple networks, many of which may be less secure than yours.
Standard security practices dictate a “default-deny” firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization’s day-to-day operation.
Many businesses have setup a network themselves or have had someone with little knowledge and implemented a “default-allow” ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.
Many software companies try to combat this problem by regularly releasing updates to their software whenever a security hole is found. If you’re not diligant in updating software and patches, you leave your sensitive data wide open to unauthorised access.
If you think your security is not all that great, take advantage of the Bonza Network Security Audit.
Our 30 minute Audit of your system will reveal any problem areas.
http://www.bonzamobilecomputerrepairs.com/computer_network_security.php