IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Scheduling Change of Passwords

27 April 2011 By Saran

If you are in charge of network security, one thing you may want to consider as far as laying down the law in safeguarding your network is the regular change of user passwords to avoid potential hackers and cracks based on how their passwords can be easily guessed.

For some users, it is easy to figure out their passwords. The normal passwords that people use include:

1. Birthdays
2. Anniversaries
3. Car Plate Numbers
4. Mobile Phone Numbers
5. Adding 123 to their names, or
6. Using “PASSWORD” as their password

Now there will be a lot of potential combinations depending on the length of the password. That is why the longer passwords (8 alphanumeric characters) are encouraged for users who access the network.

But while the probabilities of guessing or cracking passwords offer a lot possibilities, employing a regular maintenance as far as changing them is indeed something ideal to combat these hackers or malicious people from gaining access to the network and the programs in use.

Once cannot avoid the fact that some people’s curiosity and call for fame are the main reasons for wanting to be a hacker or code cracker. It is evident in people who are looking to try out their skill. They don’t think of the outcome which can cause a lot of problems.

So one good tip to avoid being hacked is to think like one. Once you do, think of security policies that can make it hard for you to breach a system. That is the best way to stay efficient in your line of duty in any organization.

Filed Under: IT Security Basics, Network Security, Security Policies Tagged With: network, passwords, security, systems

Patch Up or Lose your Information

20 April 2011 By Saran

You just have to look at how Microsoft always announces certain patch releases for their software these days. Nothing is definite and safe just yet especially if you consider hackers and computer geeks trying to discover flaws in certain computer software such as an operating system. There will always be something discovered and the loophole can be entirely critical and dangerous.

Unlike in the latter 1990’s, today we rarely see patches being given since they have more or less covered the security threats ranging from viruses to malware today. There are still recommended patched needed. But surely, they are not as rampant and dangerous compare to before. And to make sure that you are using authentic software, they make use of software authenticity codes to know if you are using genuine software or not.

Microsoft can be commended for this but it still remains that there are still a lot of flaws as far as their software releases are concerned. But to make sure that customers do not experience these unfortunate mishaps, a continuous research and development for such threats has to be implemented. We can see these days that something will suddenly break out and if you are not protected, chances are you are missing a patch.

As much as possible, apply these patches. If you are in doubt, read on them or even ask for technical support. Security breaches in the IT world are common and to stay away from such a discomfort, it is best to be updated and make sure you are well-protected.

Filed Under: IT Security Basics, Malware, Operating Systems Tagged With: Malware, Microsoft, patches, security, viruses

Installing CCTV Cameras

13 April 2011 By Saran

Closed Circuit TV Cameras (CCTV) have indeed become a new face of overall protection and security. At the rate that security is breached and terrorism growing rampant these days, it is apparent that any place or business establishment needs to work up its security measures to ensure maximum protection for the innocent consumers and people who are unaware of threats that may come their way.

But one issue that has been heard all throughout the world is on their reliability. You can monitor various activities but then what? What action would you take? If you do, would it be enough to avoid any accidents that may suddenly occur.

Apparently, many establishments just want to avoid the trouble. Mischief lingers anywhere these days and the best thing that you can do is to try and avoid them. Compared to the early days, tighter security through videos allows the place owners to monitor abnormal and suspicious behaviors to which the proper steps to avoid them can be done.

The list goes as far as advanced security measures such as the high security of sealed places where new technology as thumbprints, eye scanners and card swiping for better monitoring of accessing people limits the list of potential breaches in a certain area.

This has helped a lot and in times where something unfortunate may happen, investigators can have a better time catching culprits thanks to these hidden monitors. These days, that is why most mischievous people have made it a point to survey before attacking. Sadly, some of them have found a way to get around CCTV security as well.

Filed Under: IT Security Basics, Physical Security, Real-World Issues Tagged With: access, cctv, monitoring, security

An Internet of Criminals

17 January 2011 By Saran

Hacker NetworkThe world of cyber-crime has grown so much in these past few years due to the explosion of growth with respect to the number of internet users the world over. It has not only expanded on the side of normal people but on the side of cyber-criminals who now operate on their own networks, spanning the globe and ready to spread their products, malicious code that first scans the globe for weak points in the security net that we all put up to somewhat give us a sense of security from the ever-growing threat which is actually futile to some extent. [Read more…]

Filed Under: General, IT Security Basics, Malware, Network Security, News, Real-World Issues, Security Policies Tagged With: Malware, security

Keep Track of Computer Room Activities

23 November 2010 By Saran

For most companies, the computer room where the company servers containing the delicate data originating from daily transactions is the most important place in the office. So while the people here are trying to figure out ways to safeguard these servers, it would be likewise important to consider external security measures such as placing locks and monitoring the activities with the use of spy cams.

Why is this important? The right question should be geared on how well do you trust you IT personnel. Evaluate their personality and see the extent to which they may betray the company and place operations in jeopardy. This not of course to discredit them but in reality, a lot of people use their knowledge and access as leverage towards being able to command salaries and money-related deals that many of us know as blackmail.

Also, physical intrusion is always a possibility. No matter how secure your area would be, it can be breached at anytime if you do not address the right measure to make it harder for them to gain access to the computer room. In short, the harder it is to get in to you computer room, the better it is. This only means you have prepared on the physical aspect of securing your IT area which is a good approach the sake of safeguarding hardware and data.

Filed Under: Physical Security, Real-World Issues Tagged With: Physical Security, security, spycams

Malware is Always a Click Away

18 November 2010 By Saran

One click is all it takes to be infected and for the avid PC user, it would be wise to make sure that you look before you click. Malware issues can come in different forms like:

1. Emails
2. Popups
3. Links via Instant Messaging

In fact, even if you know the person who sent you the link, you cannot entirely rely on your relationship and trust with them as the main reason for clicking on the link. This was done before but today, people have to be aware that there are some accounts that can be easily hacked or even impersonated.

Much of these issues have plagued us through the years. Some have had their share of problems dealing with Malware and Trojans. They are different from viruses but sometimes, they can do more harm compared to the traditional viruses.

Even having anti-virus or anti-spyware protection is not guarantee from being contaminated with them. Remember, a click is all that it takes and all hell will break loose. For most, it is easy to remedy since they can reformat their computer. But think about the files you may lose from the moment you click on these links.

It may be hard to save these files since chances are they have already been infected. With that said, your files and PC are practically good as dead. So the moral of the lesson is, don’t be trigger happy with clicking. You are just raisin the stakes of being infected by doing so.

Filed Under: Malware, Spyware Tagged With: Malware, security, Spyware, trojans

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security