Information Security for SMEs


This article explores computer ...
aiming to give ... an insight into why they must be ...
in ... their systems.
There are many aspects to security on the Internet and a lot This article explores computer security, aiming to give businesses an insight into why they must be proactive in protecting their systems. There are many aspects to security on the Internet and a lot has been made recently of the security of e-commerce transactions.
Whilst many of the security issues that a website administrator faces are similar to those that your businesses computers are threatened with, this column will concentrate on how and why you should secure your internal IT investment. The Internet in its current state is similar to a city with no locks on the doors of its houses, where computers can be thought of as houses and the networks making up the Internet, the city streets.
Computers as they are sold today are inherently insecure, allowing access to anyone with a bit of curiosity or malicious intent. As businesses come to rely more and more on electronic information (not least e-mail), the potential disruption caused by a data burglary, informational arson attack or digital graffiti has reached a level that businesses should not ignore The threat Any computer on the Internet exposes a series of ports through which information flows.
By default these are all open and unlocked. Whilst many of them may lead to empty rooms or brick walls, an attacker will only need to find one port vulnerable to attack for the whole system to be compromised.
Even if your ports are secure; intruders can get into your computer in a Trojan horse. A piece of software disguised as something useful can contain a malicious sub-program to install a backdoor into your system.
Often these programs claim to give something for free or display small games whilst an attacker has a good nose around One of the most worrying developments has been the proliferation of automated attacks. These can be run from an attacker's computer, scanning hundreds or thousands of computers in a day; or can be the self-replicating Internet worm.
These are a hybrid of virus programs and computer security attacks. In worst-case scenarios, they can bring whole segments of the Internet to a standstill.
Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accounts the day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer do the job for which they were intended.
When we drive a car we are accepting and using a set of standards that have evolved since the turn of the century to ensure safety, convenience and fair access for all users of the road system. Some of these standards are globally accepted (for instance a road is made from tarmac and wheels are made from rubber) whilst others vary from country to country (for example if we drive on the left or the right).
The practical upshot of these standards is that a car designed and built for use in one country can be safely used in another (possibly with a little bit of inconvenience). The aftermath Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls.
An electronic attack could leave you with no data (imagine losing your accounts the day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer do the job for which they were intended. Almost worse than losing all your data (because we know you keep a regular backup), is having your system infected with a worm program.
In some cases this can leave your computer unknowingly sending an attack the way of all your contacts. Alternatively, your computer could be under the complete control of a third-party, who is using your processor, memory and hard-disk for their own purposes.
What can I do to stop it? Just as it is not the councils responsibility to stop burglars coming down your street, in the UK there is very little responsibility on ISPs to prevent attacks. If your systems are not locked (with firewall software), alarmed (with an intrusion detection system) and insured (by taking a daily backup) you have no-one to blame but yourself.
There are three pieces of software that every business needs to at least consider. I cannot over-emphasise the need for an up-to-date virus scanning program.
Most reputable products will scan for and remove some Internet worms and some Trojan horses; however they will not detect other types of attack. For those attacks a good firewall package is essential.
Installing one of these programs is akin to fitting locks to your doors and windows. Finally an intrusion detection system (IDS) is similar to an alarm system, warning you of a potential attack.
In my opinion all businesses should have a solid anti-virus policy as well as a good firewall. Whichever solution you choose at the end of the day, you must fully understand its capabilities or it will be as effective as not having anything at all.
Keep an eye on patches Most electronic attacks exploit a mistake in the program code of the software you use. Responsible software vendors will issue a 'patch' that resolves each issue as soon as it is brought to their attention.
You will find that many software companies have e-mail lists that you can subscribe to in order to be notified of new problems and patches. This patching mechanism makes up the software industry's response to the hacker community.
If you are applying your patches diligently, the security of your computer systems depend on how far ahead either side is. It is therefore good practice to have a complete security audit of your systems by an external consultant twice a year or more often if you rely heavily on your data.
It won't happen to me Your business network is constantly being probed by hackers on the Internet looking for ways into your data. Most attacks occur without the user even knowing that a system is compromised.
Our systems at FWOSS get probed three or four times a week, so our firewall is invaluable in ensuring they get no further. What can I do in the case of an attack? Of course your regular backup provides your ultimate safety-net, but as the effects of different electronic attacks are so varied there are no hard and fast rules to recovery.
It is very much a case of prevention being better than cure; therefore you should think about installing an anti-virus program, firewall and intrusion detection system. You should keep a daily backup; check if your systems need patching weekly; and have a security audit bi-annually or more frequently.
Article Tags: Intrusion Detection System, Intrusion Detection, Detection System Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

Teenagers and Social Media- Guide for Parents


More than 90% of teenagers use social media and 71% of them have more than one account in these apps. It’s easy to see why social media is popular, but what are the effects or even risks of using social media on the teenager’s brain. A study done at UCLA...

6 Dirty Habits That Are Actually Healthy


There are truckloads of unconventional habits that you should be participating in. If you wanna know about them, curb your desire to puke and sit tight! Do you secretly indulge in questionable habits? You’d be lying if you said no to this! Come on, we all have our fair share...

Migrate Microsoft Teams from one Tenant to another


Planning to Migrate Microsoft Teams from one tenant to another? Know the alternate processes to tackle all your MS Teams migration worries. Planning an MS Teams migration from one tenant to another? Let us help you out with few alternate processes to tackle all your migration worries.   Microsoft Teams: The...

Interviews on lifestyle news - An Overview


Update Needed to Enjoy the media you need to either update your browser to your modern version or update your Flash plugin. Looking at and expecting specific filler term alternatives will probably be challenging as it's subtle. Pals may be additional prone to note a change in how you converse...

Bringing Your Clients the Power of Positive Thinking


Norman Vincent Peale, author of the book The Power of Positive Thinking once said, “Change your thoughts and you can change your world.” Many of us, when we face challenges in life, aren’t interested in people telling us to “look on the bright side” or to keep a positive attitude....

Psychological problems and the treatments within you


Psychological problems and the treatment is within you   Why isn’t pulling your hair considered a socially acceptable way of dealing with distress while smoking is?  The worst case scenarios ... Psychological problems and the treatment is within you   Why isn’t pulling your hair considered a socially acceptable way of dealing...

Latest Politics News | Current Politics News In India


This has led towards the rise of political functions with agendas catering to one or a mix of these teams. Events in India also concentrate on people who find themselves not in favour of other functions and use them as an asset. The president is shifting his messaging within the...

PMUY: Pradhan Mantri Ujjwala Yojana Recommendations


Three boundaries drive a maximum of the low uptake of PMUY refills: Affordability – because of the excessive powerful price of the top off, that's INR 150–250 (USD 2.3–3.8). This value is better than the actual refill rate once misplaced wages and transportation fees are factored in. The inconvenience of...

PMSBY: Features of Pradhan Mantri Suraksha Bima Yojana


PM Narendra Modi in 2015 launched Pradhan Mantri Suraksha Bima Yojana (PMSBY) in Kolkata, West Bengal. It is an Accident Insurance Scheme (AIS) supplying demise and incapacity cover as a result of an accident.Insurance isn't a newer concept to India; however, its attain is still tons limited. In spite of...

Pradhan Mantri Jan Dhan Yojana


The Government of India has regularized specific saving schemes for the welfare of citizens. These schemes are added into movement with one common objective- a guide to all individuals. One such scheme is Pradhan Mantri Jan Dhan Yojana introduced by means of the Prime Minister of India on 15 August...

Search topic

Pradhan Mantri Jan Dhan Yojana

The Government of India has regularized specific saving schemes for the welfare of citizens. These schemes are added into movement with one common objective- a guide to all individuals. One such scheme is Pradhan Mantri Jan Dhan Yojana introduced by means of the Prime Minister of India on 15 August...

Learn more