Computer and Network Security

Computer and Network Security

If your company computers are connected to a network, and even more so if your local network has access to the Internet, the protection against unauthorized removal of information through a computer network should be very important to you.

Specific search for and removal of information on the computer is possible in three ways:
1) From the workplace (i.e., sitting directly behind the keyboard);
2) Over a network (LAN or WAN (Internet));
3) Through the base unit, opening it and pulling the hard drives.

First of all, access should be restricted to computers that contain sensitive information. Each machine must be assigned to a particular specialist, and only he can have access to it. Only a small circle of employees can have access to all computers. A password should be set to protect against unauthorized access to computers.

Attention!
- Any password can be removed if it is possible to open a computer system!

It is unacceptable that computers with sensitive information are in a place where they cannot be provided limited access for direct output of information, and for visual observation of what is happening on the screen.

At weaning time from work (when the computer is disconnected from the network) to block access to it by setting additional passwords (for example, in the program screen saver).
It is desirable that the premises which contain sensitive information, are separate, closed, and put on the alarm during after hours. The same applies to the premises in which the server computers are located. Protection against unauthorized access to computers in a local network is provided at the server level. You must install the necessary software to protect the internal network from penetrating the enterprise wide area network (Internet).
Some computers outside the local network, but with access to the Internet, should also be protected by special software. It should use only programs that update regularly.

Remember! It's possible to lose important information from a simple power failure on the network. Use uninterrupted power supplies to guard from that.

Order to get into your computer network can be:
1) Removal of information (for example, in order to obtain trade secrets);
2) Destruction of the information (in order to alter the normal operation of your company);
3) Damage (replacement) of information. This kind of abuse is often the most dangerous, because they do not always have the opportunity to notice the substitution produced. This is often used to alter the normal activity of a company. Recently, the threat of such attacks on the security of the company is perceived by some organizations as the most dangerous attack (both in frequency and possible consequences).

Also, there are unscrupulous companies - competitors who hire hackers to get information from a database of your business. Chances are you will not even notice such a penetration into your database via the Internet, just gradually lose your customers and in the end it may be a business. During an economic recession, this kind of fraud increases exponentially, because of the desire to keep away from bankruptcy by all means.

These types of frauds are almost impossible to identify and bring the criminal to justice, and therefore the best way to be protected against this is to be proactive and create a reliable protection for your business.
We will help you protect important information on your personal computer.

                                       

User login