Revealing The Myths About Network Security
by Dino Covotsos - MD Telspace Managed Security Services - Friday, 17 March 2006.
FACT: In reality, nothing could be further from the truth. Whether you are a casual home user or a large enterprise, your computer contains valuable and sensitive information. This could be financial records, passwords, business plans, confidential files and any other private data. In addition to your private information, it is also important to protect your network from being used in denial of service attacks, as a relay to exploit other systems, as a repository for illegal software or files, and much more.

MYTH: “A ‘port scan’ is the same thing as a security analysis scan and some web sites already give me that for nothing.”

FACT: Actually a port scan and a security analysis scan are two very different things. In general terms your computer's Internet connection has 65,535 unique service ports. These ports are used both by software running on your computer and by remote servers sending data to your computer (when you view a web page or check your email). A port scan will simply tell you which service ports are being used on your computer. It does not test any of these ports for security threats nor does it tell you where your network is vulnerable to possible hackers or attacks.

MYTH: “The best time to deal with network security is when a problem arises.”

FACT: The best time to deal with network security is right now, before a problem arises and to prevent you from ever becoming a victim. Think about it – the best time to lock the doors in your home is before a robbery occurs. Afterwards it is already too late, the damage has been done. This is why it is critical to analyse your network's security now, to find and fix the vulnerabilities before a break-in happens.

Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Dec 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //