Are You Being Hacked?
Answer the two questions below to
determine whether your company's network is vulnerable to hacking from the
If you answered "yes' to either
question, you are probably safe! (Probably, because a determined hacker
can hack into just about any system.)
- Does your network have a firewall or
proxy server between it and the Internet?
- Do you use a port monitor when you
are connected to the Internet?
If you answered "no", then
read on. I want to make you aware of the dangers of being hacked into and
some possible solutions.
We all know that computers can be
compromised easily. Let's look at the more common scenarios.
1. Virus-infected files are
introduced into your system either by downloading executable files or by
transferring files from a floppy disk.
Don't permit file downloads and
disable the floppy drives. That's what many businesses do.
Set user permissions so they cannot run
executable files which you have not authorized. You need to have very
tight control of your systems. Period! End of argument!
Nobody needs to have floppy drive access
except for the system administrator. If users need to store files,
create individual directories on a server for storage purposes. Viruses
are simply too numerous to keep track of. Somehow employees always seem to
be on the cutting edge of this annoying technology!
2. Accessing the Internet
without a firewall or proxy server.
Not installing a shield between your
network and the Internet is just plain silly. It's like leaving your front
door unlocked in Manhattan. Don't do it!
As the use of cable modems, ADSL lines and
T1 connections has proliferated, so has our exposure to intruders from the
Internet. You cannot compromise your internal security by not having a proxy
server or firewall installed at a minimum.
3. Having your ports
Install a port monitor.
After all, data has to pass through your
ports. Make it your business to know what's actually going back and forth.
Several software makers have produced very inexpensive port monitors. BlackIce
are two examples. Both programs will log any port scanning and even notify
the intruder that he has been caught. Sort of a computer version of a
What are the consequences of hacking? If
somebody gains control of your system, he can use it to send spam or
worse. Your IP address could be banned as a result of such abuse. A hacker
can also gain access to your confidential information and records.These
are only a few of the more obvious examples of the havoc a hacker can
wreack on your system.
So, don't be slack or you'll get hacked!