Thursday, 29 November 2012

How To Make Money In The Stock Market


Almost every business has computers and our data is very valuable if not more valuable then the computer and hard drive holding it, now days it is different. We were more worried about the computer going missing then the data, and not every business had one, computers were four times the price they are today, " When I first started out in the technology industry physical security was a more a priority. Company called "Tek Systems. Several weeks ago I heard about an instance of theft from a business in the Cowichan Valley involving a Hard Drive stolen from a PC from an individual portraying an I.T.

Thus fooling the person into allowing him to work on the PC, in this case the individual portraying him self as a PC technician performing an upgrade on the business PC, social engineering is a non-technical kind of "Hack" that relies human interaction and often involves tricking other people to break normal security procedures, the incident with the hard drive being stolen was a prime example of one of the oldest hacking techniques called "Social Engineering" In technological terms.

The physical security of it, we often over look some of the easiest and simple techniques to protecting our data. Well at least for a few weeks, but if we buy the latest anti virus and firewall software were safe, criminals trying to get our most private information and credit card numbers at every click of a button, it seems that very second day there is a new virus that will crash the internet and end all humanity, routers and anti-virus software, in this day in age all we hear about are firewalls. So what can we do to protect ourselves?

As well there are many solutions on the market to physically secure the PC to a desk such as computer cages that bolt on and cables similar to bike locks, almost every PC now days comes with an area to place a pad-lock to lock the case so no one can enter without a key, the first one is locking the PC.

When the technician has there doing repairs or upgrades he should walk though booting up and check the PC with the user or I.T coordinator ensuring that the repair was successful. They shouldn't just show up at your door; a good company will provide ample notice of any upgrades to take place. Who is responsible for coordinating computer repairs within the office with your information technology providers, have a single point of contact for your business an office I.T coordinator per say, and make sure your staff know who they are, the second is know your information technology providers.

It just protects your data and your company's reputation, but that still does not stop them from stealing your computer, most criminals do not have the expertise and or skills to crack this type of security, data encryption software is relatively cheap and simple to use. These built in features are rarely used, requiring passwords to even boot the laptop, most laptop manufactures have it built in security measures in place, there are many types of software out there to do this, the third is secure your data.

We just have to remember to practice safe computing, criminals will always find ways to steal your data and equipment but if there is deterrents and measures in place to make it harder they will generally continue on to the easier target, where there is a will there is a way.

No comments:

Post a Comment