Security

The 5 Most Common ways your Network can be Hacked…and how to prevent them

I’ve had the unfortunate experience of helping a number of companies to overcome security breaches in the past and it’s doubly unfortunate when the breaches could have been prevented with a minimum of fuss and a little bit of effort.

DETAIL

Heartbleed – What passwords are at risk?

While the extent of the damage is unknown the list below is the of common sites and whether you need to change you password. Bear in mind that if one of these sites says Change Password and you use the same password on other sites (bad idea to start with!) then you need to change the passwords on the other sites too, even if they don’t require it (hence the bad idea statement above).

DETAIL

Locking down your Firewall with Port Based Rules

It doesn’t matter what firewall you have, be it Cisco, Zyxel, Sonicwall etc you need to put rules in place to ensure that your network is properly protected.

There are a number of services you may also want to consider depending on your needs. These include content filtering, email filtering, anti-virus, and VPN licences. But the basics of a firewall require you to put rules in place that prevent / permit traffic to / from your network.

DETAIL

Pick a Proper Password – Say it 10 Times Fast

No it’s not a tongue twister for today it’s a lesson in the obvious for the IT world but one that’s still ignored. Lately Jeremi Gosney in Stricture Consulting Group analysed the Adobe Password file posted online of the hacked 38 million user accounts and posted the top 100 online

DETAIL

RansomWare what to know…

RansomWare is a type of malware that infects a computer and restricts it’s usage until you pay a ‘ransom’. In the case of CryptoLocker that ransom is either USD $100 or $300 depending on the variant. This particular strain encrypts all common files (word processor, spreadsheet etc) that the infected computer can access, this includes server shared folders and Dropbox shares. The only known way to decrypt is by paying the ransom or resorting to backups to restore the files from previous instances.

DETAIL