Network Security guide for the home or small business network – Part 17 – The Security Mindset



This may be one of the most important entries in this series. An important defence against those that would try to access your network is to constantly have the “security mindset”. Ask yourself “do I need this, how could it be exploited, what are the implications of this”… When it comes to people asking you to click on a link… “do I trust the person, am I sure it’s from the person that it claims to be… how sure? is it normal behavior for this person to ask me to click on a link?” I guess what it comes down to is developing some healthy critical thinking and skepticism…


One of the earlier examples was of possible social engineering attacks… one was of a person calling claiming to be from an ISP asking for password and username information to help make sure their files are complete. Are they really from the ISP? Ask for their name… they may provide a number and supervisors name to verify, search the number online does it seem to check out as being from the ISP? Call the ISP at a number you are aware that you can contact them. (Use other means than the person that’s seeking information from you.) Be skeptical.

If someone comes claiming to have a work order to look at network equipment find out who called. Has this person come before, do you KNOW they come to service equipment? How do you know? If they’re substituting for someone, were you aware that the usual person wouldn’t be there? Once again, did someone call in a problem? Be skeptical.

Websites… “this website claims their security product is the best thing since sliced bread…” it may be, but of course, they’ll say that about their own product. Use search engines, look for other opinions. One thing I’ve found is that you can usually tell a bad or suspect product by the overwhelming number (and intensity) of negative opinions you find online. Make sure the review sites aren’t affiliated with the site selling the security product. Be skeptical

Emails… “how do I know my bank sent me this email?” The return email address could be spoofed, the graphics could be forged and the links could be obscured. If there appears to be a problem contact the bank (or other sender) through other means. Be skeptical.

What it comes down to is, if you have something making a sudden “cold call” out of the blue, think about it, ask questions and try to verify it through another source.

On the critical thinking side… So, my firewall is telling me that my new painting program is trying to access the internet, “Why would a paint program need to access the internet?” once again skepticism, combined with some critical thinking.

Now, really if you follow this far enough you can close in on paranoia I think most people though will know when and how to balance their skepticism. The real catch with many people is to get them to start thinking that way to begin with.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 12 - Antispyware I've talked about Antivirus software as an essential. Today we're going to look at Antispyware software. There is a difference. By definition a virus is a piece of software that infects other files or copies itself. A worm is a virus that spreads without user intervention. (From one open network......
  • What a week.... I think it's time to pass along a long story of what's gone on over the last week or so here and some of the reasons there hasn't been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond......
  • New Featured Books section I just thought I'd do a quick post to mention that I've added a new category called "featured books" and it's a place where, well..... I'll ummmm feature books. I don't know I might feature other things too, I might need to rename the category at some point, but... From......
Blog Traffic Exchange Related Websites
  • Critical Mistakes in Keeping Blog Visitors One of the most critical parts of your blog is the section that is visible in the browser window without requiring any scrolling on the behalf of the visitor. What this means, in no uncertain terms, is that the most important and most critical elements need to be in this......
  • Continuing to Prosper... I'm completely addicted to lending money on Prosper.com. I'm at the point where I have to transfer $100 every 10 days to get my fix in of searching for a great borrower where I can get a great rate. In the past six weeks I've transferred about $600. I have......
  • What Is The Difference Between An Unsecured Personal Loan And A Secured Personal Loan? There are two types of personal loans that you can obtain as an individual. The first is a secured personal loan, and the second is an unsecured personal loan. A secured personal loan is a loan that you get with collateral, and therefore is a much easier loan to get......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site