3 Internet Safety – Computer Services – Computer Protection
Even the most prominent websites can be compromised and can create issues for unsuspecting users. On February 21st, WeLiveSecurity reported that NBC.com was compromised in such a way that some anti-virus software solutions were blocking users from accessing the NBC.com site. If users were allowed to go to the site, their computers could have been infected and compromised. This is an everyday example of how important it is that every computer have the proper protection in place and understand these internet safety tips to protect your information. The unfortunate reality is that one solution isn’t good enough for businesses to rely on for complete protection. While it’s true that some A/V packages did block users from accessing NBC.com, many did not.
Computer Services & Computer Protection – Internet Safety
Businesses should deploy a network-based firewall solution that has the ability to perform content management, and should also deploy the typical A/V solutions that are centrally managed. Without this type of protection in place, it is highly likely that the business will be compromised and could be unaware of the issues for days or even weeks. Many of these malicious applications will remain relatively hidden while capturing large amounts of data from users through keyboard logging and screenshot grabbing processes where the keyboard logs and screenshots are transmitted to the developers of the malicious software. This enables the developers to filter through the keyboard logs looking for times when the user types a bank name, a vendor name or other secure website. With the full logs, the malicious software developers would gain access to the secure websites as the logs would contain something similar to www.bankname.com, username, password, because that is the order in which a compromised user would type the information.
A proper firewall deployment would significantly reduce the likelihood of a compromise, because it would not only have a much greater chance of preventing the compromise. In the event a workstation was compromised, it would also evaluate data leaving the network, and could block the keyboard logs and screenshots from being transmitted to the developers of the malicious software. If you have questions on computer protection, computer services or internet safety, please contact us.