KNOW YOUR INTERNET SECURITY
Your computer is at risk when it connects to a network and begins communication with other computers. The essence of Internet security is to protect your computer and data from online attacks. More often than not, the attacks are mounted by an outside user. Basic security measures usually involve protection by well selected passwords, regularly changing of file permissions and back up of computer’s data storage.
Computers being a critical component in operating a business, it is more valuable now than ever to ensure the security of your networks especially where there is very sensitive data. You can hardly go a day without hearing of how some network was hacked into by internet criminals. News of network breach is becoming common place. This is where you need a service that checks for those short comings and prevents from future attacks. Better still, why not have in place a system that will deter online criminals? Do you imagine having to explain to your customers that someone has stolen their credit card information?
Concerns over security are in some ways peripheral to normal business operating, but serve to show just how important it is that business users feel confident and assured when using IT systems. Security will always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable to them.
A firewall is a software program that has the ability to blockade any unauthorized ports on the computer. Firewalls are set up for the purpose to record data of connection details. Firewalls are available in three main configurations.
One is the stateful firewall is a more secure form of firewall, and system administrators often combine both a proxy firewall with a packet-filtering firewall to setup a highly secure system. Many domestic users make use of the software firewall. These types of firewalls can create a log file where it shows and records all the connection details, including connection attempts to the computer.
Some programmers can also create programs with intentions of destroying the computers data by using tricks. Such of this are known as viruses, Trojan horses, worms and spy ware.
o Worms are software programs which are able to replicate themselves over a computer network and in turn perform malicious actions.
o Viruses are software programs which are able to log into the personal files on a computer it has infected resulting in removing all of them, leading to serious side effects to the computer.
o Trojan horses are software programs which disguise to be carrying out one thing, but in reality snoops out your personal data, or damaging it. These types hide their identity or true intentions and are usually not easy to detect.
o Malware are classified as Trojans with a limited payload and are usually not detected by most antivirus software. For this reason, it is best to install additional software which will detect Malware.
The upside is that there are many effective Anti-Virus software available in the market to fight the threats mentioned above. These can be purchased from vendors or bought online. Caution should be taken in the selection of anti-virus software, as some programs are not very affective in detecting and destroying viruses or Malware. Also ensure that your Anti-Virus data base is current and up to date.
There are two major kinds of threats related to spy ware:
Adware is simply those annoying pop-ups which keep constantly advertise things on your page. These programs without your knowledge secretly install themselves on your computer files and are stuck there until the day the computer system is cleaned up completely.
Spyware as the name suggests spies on your computer while it collects and sends information to the computer to the manufactures and even when the program is never used it continues to do so.