Network Security guide for the home or small business network – Part 17 – The Security Mindset



This may be one of the most important entries in this series. An important defence against those that would try to access your network is to constantly have the “security mindset”. Ask yourself “do I need this, how could it be exploited, what are the implications of this”… When it comes to people asking you to click on a link… “do I trust the person, am I sure it’s from the person that it claims to be… how sure? is it normal behavior for this person to ask me to click on a link?” I guess what it comes down to is developing some healthy critical thinking and skepticism…


One of the earlier examples was of possible social engineering attacks… one was of a person calling claiming to be from an ISP asking for password and username information to help make sure their files are complete. Are they really from the ISP? Ask for their name… they may provide a number and supervisors name to verify, search the number online does it seem to check out as being from the ISP? Call the ISP at a number you are aware that you can contact them. (Use other means than the person that’s seeking information from you.) Be skeptical.

If someone comes claiming to have a work order to look at network equipment find out who called. Has this person come before, do you KNOW they come to service equipment? How do you know? If they’re substituting for someone, were you aware that the usual person wouldn’t be there? Once again, did someone call in a problem? Be skeptical.

Websites… “this website claims their security product is the best thing since sliced bread…” it may be, but of course, they’ll say that about their own product. Use search engines, look for other opinions. One thing I’ve found is that you can usually tell a bad or suspect product by the overwhelming number (and intensity) of negative opinions you find online. Make sure the review sites aren’t affiliated with the site selling the security product. Be skeptical

Emails… “how do I know my bank sent me this email?” The return email address could be spoofed, the graphics could be forged and the links could be obscured. If there appears to be a problem contact the bank (or other sender) through other means. Be skeptical.

What it comes down to is, if you have something making a sudden “cold call” out of the blue, think about it, ask questions and try to verify it through another source.

On the critical thinking side… So, my firewall is telling me that my new painting program is trying to access the internet, “Why would a paint program need to access the internet?” once again skepticism, combined with some critical thinking.

Now, really if you follow this far enough you can close in on paranoia I think most people though will know when and how to balance their skepticism. The real catch with many people is to get them to start thinking that way to begin with.

Related Posts

Blog Traffic Exchange Related Posts
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
  • Network Security guide for the home or small business network - Part 12 - Antispyware I've talked about Antivirus software as an essential. Today we're going to look at Antispyware software. There is a difference. By definition a virus is a piece of software that infects other files or copies itself. A worm is a virus that spreads without user intervention. (From one open network......
  • RSS feed to spread the word of software updates The computer security landscape today is such that pretty much ALL software, whether it's Operating System, Office Suite, Web browser or device driver is at any given time "the weakest link". One of my dreams as someone that does IT is "what IF there were an easy way to keep......
Blog Traffic Exchange Related Websites
  • What Is The Difference Between An Unsecured Personal Loan And A Secured Personal Loan? There are two types of personal loans that you can obtain as an individual. The first is a secured personal loan, and the second is an unsecured personal loan. A secured personal loan is a loan that you get with collateral, and therefore is a much easier loan to get......
  • Using a Home Improvement Guide for Best Results Using a home improvement guide for best results is actually a somewhat explanatory title on its own. However, there are many people that for one reason or another have a mental block when it comes to using help of any kind. It is for these people that this guide has......
  • Continuing to Prosper... I'm completely addicted to lending money on Prosper.com. I'm at the point where I have to transfer $100 every 10 days to get my fix in of searching for a great borrower where I can get a great rate. In the past six weeks I've transferred about $600. I have......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site