Revealing The Myths About Network Security
by Dino Covotsos - MD Telspace Managed Security Services - Friday, 17 March 2006.
FACT: In reality, nothing could be further from the truth. Whether you are a casual home user or a large enterprise, your computer contains valuable and sensitive information. This could be financial records, passwords, business plans, confidential files and any other private data. In addition to your private information, it is also important to protect your network from being used in denial of service attacks, as a relay to exploit other systems, as a repository for illegal software or files, and much more.

MYTH: “A ‘port scan’ is the same thing as a security analysis scan and some web sites already give me that for nothing.”

FACT: Actually a port scan and a security analysis scan are two very different things. In general terms your computer's Internet connection has 65,535 unique service ports. These ports are used both by software running on your computer and by remote servers sending data to your computer (when you view a web page or check your email). A port scan will simply tell you which service ports are being used on your computer. It does not test any of these ports for security threats nor does it tell you where your network is vulnerable to possible hackers or attacks.

MYTH: “The best time to deal with network security is when a problem arises.”

FACT: The best time to deal with network security is right now, before a problem arises and to prevent you from ever becoming a victim. Think about it – the best time to lock the doors in your home is before a robbery occurs. Afterwards it is already too late, the damage has been done. This is why it is critical to analyse your network's security now, to find and fix the vulnerabilities before a break-in happens.


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th