Jump to content
xisto Community
Sign in to follow this  
Spurious

How To Stop Hack Attacks?

Recommended Posts

Below is some more news about how to stop hacking.
Im also going to create a tutorial based on this one aswell as my other topic.

ATTACKS on corporate computer systems from hackers on the Internet pose a serious risk to businesses. The advent of digital economies and the increase in the number of transactions being conducted over the Internet on a daily basis exposes companies to continued security risks, says Eric Levenstein, partner at Werksmans Attorneys.
"Attacks on corporate data come from some surprising quarters," he says. "Teenage hackers, usually blamed for compromised security, account for just 7% of reported violations, while infiltration by a company's competition peaks at 39%. Even more surprising is that most of the hacking on a network is done by trusted employees. In addition, the potential for private and confidential information being intentionally or inadvertently distributed to the outside world is a real possibility."

The better approach is to secure access from the Internet to the internal network of a company. Here access control devices include firewalls, which can take a number of forms.

Advanced firewalls provide detailed logs of incoming and outgoing traffic and have the ability to control this traffic per individual user. Once the network access has been controlled, the content flowing into a network must be controlled.

Often legitimate traffic may contain illegitimate content in the form of viruses or software. This can allow an external hacker to pass a program into the network so that an attack can be staged from the inside. It is relatively easy for hackers to eavesdrop on Internet traffic and obtain passwords and confidential information. Encryption, where data is scrambled using complex algorithms, can be used to solve this problem.

"In many cases the Internet is safer than private networks because these networks rely on being hidden from hackers," says Levenstein. "This is not always true and should a hacker connect to a private network via dial-up connections, the barriers that prevent penetration are limited."

a terrorist group was all the more embarrassing.

Many technology experts welcomed the intrusion as proof that governments should get more involved in monitoring the Internet.

What is clear is that businesses and companies carrying out trade on the Internet will not only have to contend with technical issues and security fears, but will also run the risk of surfing into national, and in some instances international, legal problems.



Souce | With permission

Share this post


Link to post
Share on other sites

At these times it is better to be aware of hacks and their malicious work. Here are some tips:1.Use an antivirus and update it frequently and update to the latest version as soon as possible. Antiviruses keep away trojans, which are used from hackers to send spam and damage your computer. Kaspersky Internet Security is my fav at the moment.2.Use a firewall by blocking your information being seen. If you are a windows user go to you control panel and activate it.3. Check system events for software you didn't install or start, then beware of any spyware invading your pc.4. Always Update your computer. Windows always releases security updates, which enhance your computer security and stability.

Share this post


Link to post
Share on other sites

Some simple tips:

Always patch your operating system, applications and server package as soon as possible

Set-up firewall (at OS or at network devices) with not-too-loose Access Control List

More importanly, never use username and dictionary words as your password. A good password should in fairly long length (8 or more characters) and have a mixture in upper case letter, lower case letter, digits and symbols.

Install AntiVirus software, anti-malware software, and often update them, to take out as much backdoors as possible

More importantly, be cautious of suspicious mail, applications, and system operations triggered by programs (like modifying registry keys). Do not allow them to run before you know what are they.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.