Network Security guide for the home or small business network – Part 13 – Your own worst enemy



Once upon a time I did an article about the biggest computer security vulnerability ever. I’ve also passed along the old “the most dangerous part of a car is the nut behind the wheel” joke. If you haven’t got it yet, the computer user can be the “weakest link”. Let’s face it, you’ve got antivirus, a firewall, all the current windows updates, antispyware and a website pops up. The website looks like Windows security center and says you have a virus and need to get official antivirus software.


You download what they recommend “spyaxe” and before you know it, it’s scanning away. Problem is spyaxe is on the list of “wolves in sheeps clothing” or antivirus/antispyware programs that use questionable tactics. (False positives, disabling competitors for instance.) This new program registers as a virus with most scanners. You have been had and you were the vulnerability.

This is an area I’ve referred to as “computer smarts”. It takes practice… Be skeptical.

The most common (and effective) type of network attack is one of social engineering. I remember seeing a news show once where a police organization had hired a private security company to try and break into their network. They forged an email from one of the administrators exhorting them to click on a link in the enclosed message for important information. The link installed a backdoor they were in quickly. That was a classic social engineering attack.

Think about con-artists. The name con-man comes from “confidence man” or someone who gains your confidence to get what they want. Someone calls up and says. “I’m here in the IT department at _YOUR ISP_, we’re auditing our records and want to make sure we have your username and password on file in one place. The people in accounts have really messed things up for us, could you help us out?” Would you bite?

A person walks in… “I’m here from the ISP (fill in whatever name works in your area… I was sent to check your internet connection. I need to get at the dsl modem and one pc.” “Who called you – things seem fine”, “They don’t tell us on the work order, but they just said I needed to check it that someone was complaining about slow internet access.” Do you bite? Do you show them to the dsl modem and a pc they can use?

If you went for it, you might have just been the weakest link in your network security. Of course in some situations the above wouldn’t work. A business with 10+ employees the second one might. Maybe these aren’t the best examples though. They do get the point across I hope.

Related Posts

Blog Traffic Exchange Related Posts
  • Considerate Computing This may cover a fair amount of ground, but here goes.... Today I was looking at a system to see just what software was in use, evaluating the possibility of linux as a replacement. Office, of course was a must (at least the ability to read .doc and .xls files.)......
  • The basics Well to start out, this might should be crosslinked in the computer security section, but I'm putting it in commentary primarily to catch those who might not typically look at computer security. First, why should you care about keeping your computer secure? I've heard people ask something like this. Usually......
  • How to Remove Ghost Antivirus Ghost Antivirus is a rogue antivirus application that is the successor to Antivirus Pro. This rogue is pushed through trojan horse activity and aggressive advertising tactics. It makes things very challenging to remove this rogue because it disables task manager, as well as any security programs that it detects. It......
Blog Traffic Exchange Related Websites
  • The Best Tips For The Optimization And Promotion Of A Webpage. If you are searching for the work from home ideas and would wish to make money working online , the first thing you may like to do is to make a website. A website is your “office” in the internet where you will accept your visitors and inform them what......
  • World Wide Web Security Essentials Is Not A Real Spyware Remover. It Resembles The Functions And Looks World wide web Security Essentials is not a real spyware remover. It resembles the functions and looks of genuine spyware removal software but has no capacity to eliminate any virus, trojan or malware. Web Security Essentials is the newest addition to the growing list of rogue Antivirus programs. Internet Security......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site