Contact  | Global
Sales: 800 985 9360
24/7 Support: 800 541 7205
 

Top 4 Threats Attacking Your Network And What To Do About Them

Top 4 Threats Attacking Your Network And What To Do About Them

#1 Overconfidence
User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle keyloggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!
#2 Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.
#3 Attacks On Mobile Devices
Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.
#4 Cloud Computing
“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

About Author:

Raj Kosuri founded EcomNets in 2000. As CEO & CTO he has authored Best Practices for Business Rules Integration in 2006. Led his company to the Deloitte Fast 50 & 500 four years in a row. Was selected as one of the Smart 100 from SmartCEO Magazine in 2009. In 2009, developed the Verdio Green PC, which won the NVTC Green Award for small business 2010. In 2011, Raj released the Climetric Software designed to help Fortune 500 companies with carbon management and accounting. Raj founded the Green IT Council in 2010, an organization dedicated to energy efficiency, development, manufacture, supply chain distribution, and disposal of information technology hardware, software, and infrastructure. Raj received his M.S. from Columbia University.

Currently, Raj is working on the development of the Green Data Center in Danville, VA where he plans to offer cloud computing, disaster recovery and business continuity in a virtualized environment.