Computer Security & IT Defence Part 1

Computer Security & IT Defence – Part 1

During the 1930’s the French constructed a trench network known as the Maginot Line in a bit to fend off any invasion. They thought if you simply map out any place an enemy can attack, lay down men and barricades in those places, you can withstand attack. The French found out a decade later that you cannot map every possible avenue for attack.

Today many businesses install an antivirus program as their Maginot Line and think the IT defence job is done. However, there are many ways to access a network and bypass the antivirus software.

Hackers constantly create viruses faster than antivirus programs can recognise them. There are approximately 100,000 new viruses released daily, and cybercriminals often test their creations against all available platforms before releasing them onto the internet. The windows updates that you might click “Remind Me Later” for are often there to help with your IT defence and patch some of the vulnerabilities in the antivirus protection.

Even with great IT defence and a perfect antivirus program that is able to detect and stop every threat, once an employee has been coerced into clicking on a link on a website or in an email, all the antivirus software in the world won’t save you. It is impossible to identify every piece of malware, so behavioural identification is used. A problem with this is that some legitimate software behaviourally may look like a virus, so once a user has enabled the software to execute, antivirus software ignores similar applications unless they are a 100% identifiable threat. When the user clicks on a link from a hacker pretending to be John from IT, he is effectively telling the antivirus software that the malware is safe to run.

These are some areas hackers may target:

  • The Human Layer
  • The Physical Layer
  • The Network Layer
  • The Mobile Layer

You need an IT defence plan that will enable you to notice and respond to breaches quickly and at each level.

The physical layer refers to all the computers and devices that you have in your office and can physically touch. This layer is the easiest to defend but is still exploited often.

Data from the Bureau of Crime Statistics and Research (BOCSAR) shows the number of incidents of mobile phone theft has remained at an astonishing level averaging 22,051 incidents in NSW per year.

In regards to the physical layer it is advisable to:

  • Keep all computers and devices under supervision when in use and keep them locked away when they are not needed.
  • Have only authorised employees use your devices.
  • Be sure not to plug in any unknown USB drives.
  • Have your hard drives professionally wiped or destroy them before disposal.

If you are looking for some excellent IT defence for your business, give us a call at Advanced Technology.

Stay tuned for our upcoming articles where we cover the human and network layers of security.

, , , , , ,
Previous Post
How To Find Great Tech Support In Coffs Harbour
Next Post
Is Technolgy The Secret To Small Business Growth?

Related Posts

5 Top Cyber Security Practices for your Small to Medium-Size Business

5 Top Cyber Security Practices for your Small to Medium-Size Business

Here’s an essentials list of basic cyber security practices that your firm should be following. The fact is, the second your company connects to the internet, your data becomes vulnerable. According to a recent Telstra survey, a staggering 81% of Australian small businesses had experienced some kind of ransomware attack.…
Is Ransomware the New Normal for Network Security

Is Ransomware the New Normal for Network Security?

Cybersecurity experts are calling Petya one of the most devastating digital invasions of its type in regards to network security. Just months after the world was hit with a similar ransomware attack, WannaCry, Petya has inflicted severe pain on thousands of users, crippling banks and infrastructure. Cybersecurity experts say these…
Operate a Slick Data Backup and be a Systems Superhero

Operate a Slick Data Backup and be a Systems Superhero!

The importance of maintaining a backup of your information has never been more imperative. After all, a few years ago, hard drive capacities were small. Therefore, if the worst happened and the data was lost, at least it wasn’t gigabytes worth. Furthermore, back in the day, we weren’t under constant…