Firewalls and anti-virus software are necessary and good
place to start, but they are not enough.
Firewalls are made by humans and installed by humans,
facts which make them susceptible to error. Hackers know
where the common errors are, and they know how exploit them.
Are you sure that your firewall is properly installed and
configured?
Anti-virus software packages are only as good as their
latest round of updates, and they are only useful for common
attacks that the software companies have detected and have
decided are widespread enough to warrant an update. If
a hacker wants to create a special Trojan targeted specifically
to your company or industry, he will create one that your
firewall and anti-virus software will not recognize.
Although 99% of companies use anti-virus software, 82%
of them were hit by viruses and worms in the past year.
Hackers are not going to hit me; I don't have anything
that would interest them.
Not only will hackers focus on a specific target, they will
scan networks just to see if they can crack them. And while
they might not have specific interest in causing problems
for you, they might be opposed to free enterprise as a whole,
or on a smaller scale, your industry, and see you as a worthy
target.
My network guy is pretty good, I'm safe.
Your network is like your house. You hire a good contractor
to install doors and windows, but you call a security company
to keep your family safe. Our security experts are trained
specifically for IT security and will complement the efforts
of your network administrators.
Resources
|
Threats
- Trojans - these programs grant criminals access
to your network and its data. They can result in theft of
network data and resources, and can contribute to network
failure.
- Viruses and worms - usually created to disrupt
a network, and require careful effort to undo their damage.
- Adware and spyware - detract from a system's performance
and pose potential security threats.
Enemy #1 - Hackers:
- Main goal is to gain access to your network.
- Once in, they look for opportunities to disrupt performance
and/or steal resources and data.
- Can hide themselves so well that many administrators don't
even know that they are there.
Enemy #2 - Virus Creators:
- Main goal is widespread chaos across many networks.
- Irritate hackers by calling attention to their tools.
- Motivated by attention.
Contact Us Today
|