security

Stop the Inavsion of the Data Snatchers!

Introduction

Have you ever seen an action movie involving “hacking”? The one where the hero must figure out some sort of visual graphic interface puzzle to break into the plot device to save the day? Obviously this is more than a little misrepresentative of how such things work. I personally liken it to a sort of crossword puzzle. You have many points you can start at, and as you go and find information, the more information is revealed through what you already know. In this way, when someone attempts to break into networks that are not theirs, they have what are referred to as points of ingress. These are the “entrances” people can use to enter your network and start doing the things bad people do in others’ networks.

So logic dictates the best way to stop this from happening is to block these points of ingress; if there is no entrance, they cannot enter. This is the objective of many anti-malware programs and firewalls, but no network is ironclad. There are many “entrances” you might not have heard of. These can include:

 

  • Telnet
  • SSH (SecureShell)
  • Internet Port 80
  • Internet Port 443 (Https webpages you see commonly)
  • E-mail SMTP Port 25
  • E-mail alternate SMTP Port 587
  • E-mail POP Port 110
  • Remote Desktop port 3389
  • PPTP Tunneling Protocol port 1723
  • SQL port 1433 and 1434

 

These may seem complex and numerous, but most of these are simple things one might expect. Things such as internet webpages, E-mail, and remote desktop services, are points of ingress many people are familiar with. However, most people don’t think of telephone networks when they think of “hacking” and data theft, yet it is just as much a weak point in network security as an online webpage.

As always, Micro Systems Management is committed to providing the best data security services we can offer to our clients. If you have any questions regarding this topic, ask about our upcoming event on the 30th where our own Randy Zinn talks more in depth on the subject. And as always if you have questions about your network and what Micro Systems Management can do to make it safe – give your friendly IT wizards a call!

MSMC logo

 

 

FacebooktwitterlinkedinmailFacebooktwitterlinkedinmail

Tags: , , , ,

Monday, March 27th, 2017 Cybersecurity, General, Internet No Comments
 

Categories of Posts

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow Us

FacebooktwitterlinkedinrssFacebooktwitterlinkedinrss