Revealing The Myths About Network Security
by Dino Covotsos - MD Telspace Managed Security Services - Friday, 17 March 2006.
FACT: In reality, nothing could be further from the truth. Whether you are a casual home user or a large enterprise, your computer contains valuable and sensitive information. This could be financial records, passwords, business plans, confidential files and any other private data. In addition to your private information, it is also important to protect your network from being used in denial of service attacks, as a relay to exploit other systems, as a repository for illegal software or files, and much more.

MYTH: “A ‘port scan’ is the same thing as a security analysis scan and some web sites already give me that for nothing.”

FACT: Actually a port scan and a security analysis scan are two very different things. In general terms your computer's Internet connection has 65,535 unique service ports. These ports are used both by software running on your computer and by remote servers sending data to your computer (when you view a web page or check your email). A port scan will simply tell you which service ports are being used on your computer. It does not test any of these ports for security threats nor does it tell you where your network is vulnerable to possible hackers or attacks.

MYTH: “The best time to deal with network security is when a problem arises.”

FACT: The best time to deal with network security is right now, before a problem arises and to prevent you from ever becoming a victim. Think about it – the best time to lock the doors in your home is before a robbery occurs. Afterwards it is already too late, the damage has been done. This is why it is critical to analyse your network's security now, to find and fix the vulnerabilities before a break-in happens.


DMARC: The time is right for email authentication

Posted on 23 January 2015.  |  The DMARC specification has emerged in the last couple years to pull together all the threads of email authentication technology under one roof—to standardize the method in which email is authenticated, and the manner in which reporting and policy enforcement is implemented.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Jan 26th