Masuk

Sabtu, 05 Mei 2012

Secure is your computer

This is yet again emphasized the need to return to this very important subject related to IT and computer systems. and no one I know who do not have some form of security to him or his property. No matter whether they live in the 6-digit home or in rented accommodation. The action could range from a single key to a highly sophisticated alarm and surveillance systems, but the point is they all have some form of security.

The same should be true of our computer systems. No matter if your system is connected with national security or stand alone in your house, if it contains sensitive data for you, you should take steps to protect it.

In this article I will go through several steps that you can put into action to ensure that the candidate made life difficult for thieves.

Physical Step

When it comes to IT security world, it is easy to overlook the obvious. When I was at school one of the 'catch you out' questions like these:

"If a red house is made of red brick and yellow house made of yellow bricks, what is a green house made of?"

Logical answer is the only green bricks but the correct answer is glass. The question is posed in such a way as to lead you to think a certain way. When it comes to IT, for some reason we think of ways to manage complex security when some simple practical steps may be all thats needed.

Lock It Away

If you have a notebook make sure that you lock it away when not in use or away from your desk overnight. Although this may be convenient for the desktop is still an option. I know at least one major bank that puts all of its desktop pc into a strong room in the evening. It may be boring, but very effective.

Bolt It Down

If your computer is the server and then turn it off and store it may not be an option. Then consider a run down. You can purchase a safety cage that bolts to the floor and would take too long for a thief right to cut and steal.

Many of the appropriate server that comes with lockable front panel, which prevents the computer from being opened, and / or the drive is removed. Why not take advantage of this simple deterrent?

Monitor Sensitive Systems

If you are a business, then relatively little money is easy to set up surveillance. All you need is a security camera (low-cost starting from 200 pounds) is connected to the computer base. This system not only record events, but also can send images to a computer outside the office or even send alerts to your mobile phone. You can log into the camera from a remote site using the Internet, this is very useful if the alarm system goes off and you want to check out your place soon.

Other Options

Password Protect

You will be amazed at how many systems and sensitive documents do not have the security password. There are at least four important things about using a password.

Use strong passwords

A strong password has the following characteristics:

A mixture of lowercase /

Including the number

Includes characters such as @ &%

At least 8 characters.

If your password does not contain the above, then your system may have security equivalent of a rusty bolt with a few screws loose!

Do not use one password for everything

Change passwords on a regular basis

Some servers can be set to force a password change on a regular basis every month or whatever time scale you choose. This system can also force the password can not be reused in many cycles.

Never use a password system is sensitive to the unknown

It is the policy of the sound advice you have any questions. Break it at your peril. You have been warned. To do so is like leaving a full set of buttons labeled in a public place. There are several software products available in the market that keeps a history of logging all keys pressed on the keyboard. Some even detect a mouse click option. If you must use the password (perhaps in a life or death situation) on the unknown system to change your password as soon as you can from a secure system is known.

Write down your password!

Yes, I know many of you will read that twice and wanted to know if I've lost plot.The advice from any bank or institution never write your password down anywhere. I actually agree. You should never write your password in a form everyone can identify. But with so many passwords we need to remember, it is amazing that people use the same password over and over again? What I did, was write down my password is encrypted in a way that I can understand but no one else will know what the numbers mean. Most, if not all credit cards work with 4-digit pin number. What you can do is write it in the wrong order and add 1 or 2 more numbers in the same place each time or always add the same amount over the original number. Also, I never write my password or PIN number along with other sources, for example, I did not write the name of the bank with a number beside it. I designed a system to provide bank account name and password. If someone finds my list they will never know the meaning of information and are more likely than not throw it away.

Practice

Firewall

A unique problem associated with the IT theft is that the thief did not have to enter your property to gain access to sensitive systems or data. Thanks to the Internet can be a thief on the other side of the world, sits drinking coffee while he's stealing from you.

All businesses must have a firewall stop, full well! A good router comes with a built in firewall of varying quality. From behind the fire-walled router, will be the thief got the answer when he / she is trying to 'ping' your IP address to find out if there are computers at the other end. Do not worry about the technical terms, just Firewall makes your computer invisible to the outside world.

Prohibit / prevent the use of file transfer and chat programs

If you are a business router or a third-party software can restrict access to the file transfer program that is commonly used to download music or chat programs. The program can act as a gateway through your firewall security.

Security Software

If you are a home user or a business you should consider using one of the many third-party software package known as Internet Security. I recommend the one that marks a secure website for the search.

Protecting Mobile Devices

Many companies have the personnel who use mobile devices that contain up to date data is usually like email, milk and event reminders. Most of the devices synchronization with the main server in the office. The tool is easily susceptible to theft. What many users may not know is that they can be remotely removed from the sensitive data no matter where the design is in the world.

Backup

To protect your property it is common to insure against losses from fire, theft and accidental damage. There is no discussion about the security would be complete without mentioning the backup, the equivalent of accidental damage. Here, I just wanted to mention one method of backup that I asked about more and more these days - the backup site.

Many third-party groups are now offering offsite backup. The options available for home and business users. Of course there are some good points in favor of this option, but there are limitations that I would like to draw your attention to:

Should not be considered as an answer to the

It is rare that one solution fits all needs. For example, what happens if your broadband connection goes down?

The cost of money

Of course, as the services offered there are costs involved. Vendor service fees based on the amount of data stored offsite. Costs range widely. As a believer in 'you get what you pay for' You need to investigate each offer carefully.

Data transfer rates and the number of

You have to calculate how much data you need to go back. Remember that time offsite backup will depend on how fast your broadband connection (if you do not have a broadband option is a non starter). Most systems work by moving the first backup all the files - which can take days - then just do incremental backups thereafter.

If a service contract with your operator to limit the amount of data you can transfer you have to make sure you do not have problems of excess costs.

Generally, you can not beat doing a full backup and store the tapes offsite own. I see this as a good choice for small files but it is very important as a tool in the arsenal.

If you would like help or advice on any of the issues raised in this article please visit my website at http://www.bdp.co.uk

For further information or assistance from Steve R Bryan http://www.bryansdataprogramming.com please visit the website at where you can find information about products, services and download a free monthly newsletter Bryan Programming the data are packed full of the latest news, information and advice about computing world

Tidak ada komentar:

Posting Komentar