Advanced Information Technologies Inc. Skip to main content
Home News Products Services Solutions About Us


  Network Service  
  Security Analysis  
About our Services

Is your Network Secure?


Are you being Hacked?

    How can I be sure that my server is safe?  



Are You Being Hacked?

Answer the two questions below to determine whether your company's network is vulnerable to hacking from the outside world!

  • Does your network have a firewall or proxy server between it and the Internet?
  • Do you use a port monitor when you are connected to the Internet?
If you answered "yes' to either question, you are probably safe! (Probably, because a determined hacker can hack into just about any system.)

If you answered "no", then read on. I want to make you aware of the dangers of being hacked into and some possible solutions.

We all know that computers can be compromised easily. Let's look at the more common scenarios.

1.  Virus-infected files are introduced into your system either by downloading executable files or by transferring files from a floppy disk.
Don't permit file downloads and disable the floppy drives. That's what many businesses do.
Set user permissions so they cannot run executable files which you have not authorized. You need to have very tight control of your systems. Period! End of argument!
Nobody needs to have floppy drive access except for the system administrator. If users need to store files, create individual directories on a server for storage purposes. Viruses are simply too numerous to keep track of. Somehow employees always seem to be on the cutting edge of this annoying technology!

2.   Accessing the Internet without a firewall or proxy server.
Not installing a shield between your network and the Internet is just plain silly. It's like leaving your front door unlocked in Manhattan. Don't do it!
As the use of cable modems, ADSL lines and T1 connections has proliferated, so has our exposure to intruders from the Internet. You cannot compromise your internal security by not having a proxy server or firewall installed at a minimum.

3.   Having your ports scanned.
Install a port monitor.
After all, data has to pass through your ports. Make it your business to know what's actually going back and forth. Several software makers have produced very inexpensive port monitors. BlackIce and Jammer are two examples. Both programs will log any port scanning and even notify the intruder that he has been caught. Sort of a computer version of a security camera!

What are the consequences of hacking? If somebody gains control of your system, he can use it to send spam or worse. Your IP address could be banned as a result of such abuse. A hacker can also gain access to your confidential information and records.These are only a few of the more obvious examples of the havoc a hacker can wreack on your system.

So, don't be slack or you'll get hacked!


Privacy Legal Contact