Network Security guide for the home or small business network – Part 17 – The Security Mindset



This may be one of the most important entries in this series. An important defence against those that would try to access your network is to constantly have the “security mindset”. Ask yourself “do I need this, how could it be exploited, what are the implications of this”… When it comes to people asking you to click on a link… “do I trust the person, am I sure it’s from the person that it claims to be… how sure? is it normal behavior for this person to ask me to click on a link?” I guess what it comes down to is developing some healthy critical thinking and skepticism…


One of the earlier examples was of possible social engineering attacks… one was of a person calling claiming to be from an ISP asking for password and username information to help make sure their files are complete. Are they really from the ISP? Ask for their name… they may provide a number and supervisors name to verify, search the number online does it seem to check out as being from the ISP? Call the ISP at a number you are aware that you can contact them. (Use other means than the person that’s seeking information from you.) Be skeptical.

If someone comes claiming to have a work order to look at network equipment find out who called. Has this person come before, do you KNOW they come to service equipment? How do you know? If they’re substituting for someone, were you aware that the usual person wouldn’t be there? Once again, did someone call in a problem? Be skeptical.

Websites… “this website claims their security product is the best thing since sliced bread…” it may be, but of course, they’ll say that about their own product. Use search engines, look for other opinions. One thing I’ve found is that you can usually tell a bad or suspect product by the overwhelming number (and intensity) of negative opinions you find online. Make sure the review sites aren’t affiliated with the site selling the security product. Be skeptical

Emails… “how do I know my bank sent me this email?” The return email address could be spoofed, the graphics could be forged and the links could be obscured. If there appears to be a problem contact the bank (or other sender) through other means. Be skeptical.

What it comes down to is, if you have something making a sudden “cold call” out of the blue, think about it, ask questions and try to verify it through another source.

On the critical thinking side… So, my firewall is telling me that my new painting program is trying to access the internet, “Why would a paint program need to access the internet?” once again skepticism, combined with some critical thinking.

Now, really if you follow this far enough you can close in on paranoia I think most people though will know when and how to balance their skepticism. The real catch with many people is to get them to start thinking that way to begin with.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 11 - Why? Alright, so you're still reading this series and you're thinking. Look, I'm not protecting national security secrets. All I'm doing is (running a business|emailing my grandkids|using the web for research). True, good point. You're not at the defense department. OK. Let's say you just use your computer for email and......
  • RSS feed to spread the word of software updates The computer security landscape today is such that pretty much ALL software, whether it's Operating System, Office Suite, Web browser or device driver is at any given time "the weakest link". One of my dreams as someone that does IT is "what IF there were an easy way to keep......
  • New Featured Books section I just thought I'd do a quick post to mention that I've added a new category called "featured books" and it's a place where, well..... I'll ummmm feature books. I don't know I might feature other things too, I might need to rename the category at some point, but... From......
Blog Traffic Exchange Related Websites
  • What Is The Difference Between An Unsecured Personal Loan And A Secured Personal Loan? There are two types of personal loans that you can obtain as an individual. The first is a secured personal loan, and the second is an unsecured personal loan. A secured personal loan is a loan that you get with collateral, and therefore is a much easier loan to get......
  • Network Marketing Blog - It's Time To Take It Up A Notch! Network Marketing Blog - Why Blogging Is Stupid Easy   [/caption] On a regular basis I see sites that are starting to tell people how important blogging is to their business.  I made a huge mistake when I first started telling people they should blog back in 2006. That mistake......
  • Using a Home Improvement Guide for Best Results Using a home improvement guide for best results is actually a somewhat explanatory title on its own. However, there are many people that for one reason or another have a mental block when it comes to using help of any kind. It is for these people that this guide has......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site