10 ways to avoid computer intrusion
Sometimes small loopholes in a good sense of habit also create a security hole for cyber criminals to take advantage of to exploit for malicious purposes. Here are 10 ways to avoid creating weaknesses on our computers and networks .
1. Change the default password
It's amazing how many devices and applications are protected by the user by default name and password. Therefore, attackers know how to exploit this habit of users to profit. Only when testing a website looking for the default password, will the user understand why it is not recommended to set a password this way. Using a good password policy (creating a rule to set your own password) is the best way or any character string set for a password is better than leaving it to default.
2. Do not use the password again
Many people use the same login name and password for different websites or services. This habit of users thinks that it is convenient and easy without having to remember much. But if in one case, your password is exposed, many of your other services and logins are also at risk of being hacked. There is a useful way to help users just remember a single password - the administrator password (master) to access a list of saved passwords in it.
For example, the following figure shows the Password Safe application that stores the entire password of the identifiable pages that the user has memorized here. Thus, users only need a single matter password to access Password Safe and see the list of login names and passwords for other websites that users have saved.
3. Delete employee account when this person leaves the company
Infringement of security will be easier when attackers take advantage of information from within the company itself. Therefore, it is necessary to delete the user's account when they no longer work at the company even if the person leaves the company in any way.
4. Review security records
A good administrator must read and review the system's daily log. Because security log is the first line of defense to record the time of logging in and out of the user's network.
For example, when reviewing the security log of a Windows operating system server, the administrator reviews 529 events (error log - not knowing the username or password incorrectly). That said, the administrator needs to determine if this valid user has forgotten the password or that the attacker is trying to access the system.
Logs in the Windows security section are somewhat confusing, but there is a website that defines almost every event recorded in the log.
5. Scan the network regularly
Regular network scanning will help administrators know if any devices are installed on the network and installed at any time.
One way to scan the network is to use a net view command available in Microsoft's operating system or using free programs like NetView
6. Monitor network traffic externally
Today, malicious code or computer worms have become more sophisticated and difficult to detect. One way to detect them is to monitor network traffic externally. The suspicion will increase when the number of outbound connections or total traffic surges from normal levels. From this tracking it can be detected signs of stolen information or the email engine is attacked by spam.
Most current firewall applications can dodge traffic outside and often give the message as shown below:
7. Fix and update regularly
Keeping your operating system and application software up to date is the best way to avoid bad guys taking advantage of vulnerabilities in software to attack the system. It's simple if the operating system and applications have no vulnerabilities, the bad guys won't be able to find the way to the system.
Using products such as Microsoft Baseline Security Analyzer or one of Secunia products is the most effective way to make sure your computer is secured. Therefore, users should update all necessary patches.
8. Make a good security plan
Depending on the size of the company, we should have a reasonable security plan. A reasonable security plan is really invaluable because everyone in the company can work continuously without being interrupted by the attacks and is a safe solution to help users less worry.
Security plans should follow what the business needs. In order to set up a company's security plan, administrators need to know where the data is stored, how many employees store information and how to make an exchange between internal and external information for planning. Best security. Users can learn more about Microsoft and NIST's security plans.
9. Increasing understanding for users about information security
Training to increase the knowledge and awareness of security issues for users is essential. This will contribute to increasing the performance of employees in the corporate environment. From a sense of security, employees will know how to protect themselves and prevent attacks from online attacks.
10. Problems for higher management levels
Requiring a higher level of management to make security policies and equip the necessary security technology for the system is really difficult. And if they have management approval, they don't think that security policy should apply to themselves. Moreover, changing the regular senior manager can happen in the company. Therefore, when changing managers need to review the information security issues in the company.
The above are 10 very simple solutions that people can perform as well as help users realize the habits of using computers which will create vulnerabilities for criminals who are easy to exploit.
You should read it
- Twitch hacked, 125GB of data including source code shared on the internet
- Instructions to turn off Protected View feature in Office 2013
- Computers that are not connected to the internet can still be hacked
- What is Protected View? Turn on and off the Protected View feature in Office 2016
- Suspected FBI hacked, leaked top secret data on the internet
- Signs show clearly that your system is being hacked
- The USB has the ability to heat the chip up to 100°C to self-destruct when hacked
- How to fix The disk is write protected error on USB
May be interested
- How to Ground Yourself to Avoid Destroying a Computer with Electrostatic Dischargethis wikihow teaches you how to take the necessary precautions to avoid damaging your computer's delicate internal parts with electrostatic discharge (static electricity). while the likelihood of you harming your computer with static...
- 6 simple ways to minimize the harmful effects of sitting for a long timein today's life, the characteristics of many jobs require you to sit in front of a computer screen. therefore, the following 6 simple ways will help you avoid pain and work more effectively. invite you to consult!
- How to Avoid Costly Computer Service Callscomputer technicians can be expensive to hire even for small tasks such as virus removal. practicing good preventative maintenance and performing basic troubleshooting yourself can help avoid unnecessary service calls. install anti-virus...
- Detect and prevent intrusion in Forefront TMG - Part 1: Behavior detectionin this two-part series, we will introduce you to forefront tmg's behavior detection features.
- 9 technology errors to avoidthe mistake of using information technology applications to work is sometimes silly but can still happen to people who are very knowledgeable just because they are too subjective ...
- How to fix iPhone error does not show Trust This Computerwhen you connect your iphone / ipad to your computer, you will see a message called trust this computer? this will help to protect the device from unauthorized intrusion through the computer without password confirmation.
- Is power failure and voltage spike harmful to the computer?what happens to your computer when a power outage or voltage skyrocketed? there are ways to avoid unfortunate losses in these cases. let's find out through the following article!
- 5 effective ways to prevent laptop intrusionhave you ever thought about what would happen if your laptop was lost? could it be sold on ebay the next day? will the data be removed and displayed on some websites like myspace within a week? data stored on m & aacu
- 10 ways to help you avoid 'miss words' errors when communicatingtalking is an art that plays a very important role in life, is a means to help people approach and mingle with the community. therefore, there will probably be 1001 ways to conquer people's hearts, and here are 10 of the ancient talking art of people to help you avoid the 'miss words' when communicating.
- Set of PC maintenance tools: 5 steps to protect the systemif you frequently save, use a firewall, or take some other precautions for your pc, you can avoid 'bad jokes'. here are 5 ways to prevent disasters for pcs. if only 4 ways are done, you may be in danger.