|
|
|
Benefits Of An Accessible Website: Part 1 - Increase In Reach
The DDA (Disability Discrimination Act) states that service providers must not discriminate against disabled people. A website is regarded as a service and therefore falls under this law, and as such must be made accessible to everyone. Some...
Intro To Voice over Internet Protocol -- Save Money With Every Phone Call
You've probably heard about Voice over Internet Protoco (abbreviated VoIP or VOIP). It is one of the hottest computer technologies today.
VoIP was developed to provide voice communication between computer users at different locations. Although...
Protecting Yourself Against Spyware
Spyware is a category of malicious software that secretly obtains information about a computer user's and sends it to a third party without the user's consent. For example, a piece of spyware running on an infected computer can obtain the user's...
Riding the second dot com wave
Introduction
The beginning of the end - or - the end of the beginning
It was in the early months of 2000 that it all seemed to end,
The dot-com boom was over, billions of (insert favourite
currency here) were lost.
You...
Voice Over Internet Protocol (VoIP) - All the Information You Need
VoIP technology is revolutionary in that it combines internet
access with telephone service therefore utilizing the same
technology for two very different things. Now, instead of having
a traditional phone connection, VoIP technology enables you...
|
|
| |
|
|
|
|
|
|
Information Security Policy
Businesses that do not have clearly written Information Technology security policies and practices in place run the risk of being named in legal actions in the very near future. Although no current court cases exist, many security experts are warning that if you lose or expose confidential business or customer data, unknowingly distribute viruses or experience a breach of your systems that results in loss of service to your customers, you could be found liable.
Computer and network security used to be the concern of only the largest corporations. Now, however, with the high availability of networks, web hosting and Internet applications to even the smallest office, the tide is turning.
Today, a small business with two employees can construct an economical network, share a cable modem and purchase a firewall, which enables remote access using a Virtual Private Network (VPN). This is also a double-edged sword. This new "high availability" has also born a vast breed of crackers.* These individuals can find ways to access, steal and/or destroy data residing on public and private networks.
Starting th Process
The key to establishing these policies and practices is to not be overwhelmed by the complexity of the process. Start by taking inventory of your systems, connections to the Internet and external providers, the method in which you store data and the method in which you secure and backup data.
During this documentation process, you can identify clear procedures for the handling and transfer of this data, as well as new security measures you can use to show due diligence in addressing any potential security risks.
The Basics
Even the smallest network should adhere to the following:
Never use a computer system for both personal and business use (i.e. family uses for fun, but business is also processed on the machine). This is an immediate risk to public disclosure of confidential information and accidental loss of data.
Back to TopA daily and monthly data backup process should exist which also provides for off-site or fireproof storage of the backup data in a non-editable format (i.e. offline magnetic tape or CD-R
(not CD-RW)).
Any connection to the Internet, from a shared 56 K modem to a broadband (DSL, Cable or T1) connection, should be behind a software or hardware-based firewall. If not, this is an immediate and gaping hole through which crackers can access your private network or use your computer for an attack on a larger public or private network (often called a DDOS or Distributed Denial of Service attack).
Use a password to login to your computer even if it is not on a network. Passwords should be at least eight characters and changed as often as tolerable (90 days is a satisfactory time period).
Use and update daily an anti-virus software suite, which can protect your individual computers as well as any servers you use.
By taking these steps, you are dramatically reducing your exposure to uninvited intrusions. The inventory you established earlier can then be reviewed and a plan can be developed by your business and your technology staff/consultant to ensure your office network and data is a fortress with a little risk as possible.
Learn More About Securing Your Computer, Data and Network
Security Tracker
This site tracks all known vulnerabilities and threats in Internet and network technology. http://securitytracker.com
Microsoft Security
Micorsoft's site dedicated to their own applications, including software patches and alerts to newly discovered security issues. http://www.microsoft.com/security/default.asp
TinHat
The ABCs of web and Internet Security. http://www.tinhat.com/
Prior to participating in the founding of BMRW & Associates, Blane served most recently as the Director of Technology for VESTAX Securities Corporation. In this capacity he was responsible for the management and evolution of the IT infrastructure and services for internal operations and field technology services for VESTAX financial advisors.
Blane brings substantial knowledge in application & data integration, mining and management .
|
|
|
|
|
| Broadband Internet access - Wikipedia, the free encyclopedia |
| Broadband Internet access became a rapidly developing market in many areas in the early 2000s; one study found that broadband Internet usage in the United ... |
| en.wikipedia.org |
  |
| UK Broadband Internet Access |
| Listings of UK broadband internet access providers and their prices, links to provider guides and reviews. |
| paler.com |
  |
| PC World - Buying Guides - Broadband Internet |
| Buyers' Guide to Broadband Internet Contents ... For the majority of those looking to upgrade to broadband Internet for the business or home, it's all about ... |
| www.pcworld.idg.com.au |
  |
| Broadband Internet Access Service Providers - High Speed Cable and ... |
| Discount offers for broadband high speed, cable and DSL Internet access service providers from Broadbandinfo.com. Additionally we provide free online high ... |
| www.broadbandinfo.com |
  |
| Telewest - Broadband Internet - Digital TV - Phone - Cable ISP ... |
| . ... Jump to the Homepage [Accesskey '1']; Jump to Navigation menu [Accesskey 'n']; Jump to Main Content [Accesskey 'c']; Jump to Contact Us [Accesskey ... |
| www.telewest.co.uk |
  |
| FCC Broadband Internet Access Page |
| List of resources from Federal Communications Commission regarding broadband Internet and access issues. |
| www.fcc.gov |
  |
| BT.com: Broadband Internet, mobile and fixed telecommunications ... |
| National telecommunications provider. Details on products and services, plus user area. |
| www.bt.com |
  |
| Primus > Home - Australia's leading Broadband Internet, Telephone ... |
| Primus / iPrimus - Australia's leading Broadband Internet, Telephone, Mobile, VoIP and Dial Up provider. |
| www.iprimus.com.au |
  |
| Virgin.net ISP - Broadband Internet access, news and entertainment |
| Virgin.net, the UK's innovative Internet service provider. All you need for broadband and dial-up access, entertainment, information and news. |
| www.virgin.net |
  |
| 1 24% of rural Americans have high-speed internet connections at ... |
| File Format: PDF/Adobe Acrobat - View as HTML |
| Your browser may not have a PDF reader available. Google recommends visiting our text version of this document. |
  |
| ADSL Plans - ADSL Modems - ADSL Broadband Internet - Telstra BigPond |
| Choose from BigPond broadband ADSL plans by speed and usage to suit your needs. View BigPond broadband ADSL modem options for your broadband ADSL internet ... |
| www.bigpond.com |
  |
| ntl.com | broadband internet, telephone packages, cable tv |
| Broadband cable internet access from ntl, get high speed cable internet access at affordable prices. |
| www.home.ntl.com |
  |
| Westnet - Broadband Internet, ADSL, Dialup, Web Hosting, Domain ... |
| Westnet provides a range of Broadband Internet, ADSL, Dialup, Web Hosting and Phone services Australia wide. Connect with Australia’s Number 1 ISP for ... |
| www.westnet.com.au |
  |
| Broadband Internet : Find Broadband Internet Access Providers with ... |
| Find Broadband Internet Service Provider. TheBroadbandGuide.com is a comprehensive directory of Broadband Internet Provider. |
| www.thebroadbandguide.com |
  |
| Internode - Broadband ADSL Internet Access |
| Internode - Broadband Internet Access and other Internet services. ... Internode Broadband ADSL is the broadband Internet solution you have been looking for ... |
| www.internode.on.net |
  |
| CHOICE - Setting up broadband internet |
| Setting up broadband internet. How to get ADSL broadband, step by step Online 02/04. Contents. Setting up broadband internet · Availability and choice ... |
| www.choice.com.au |
  |
| Wireless Broadband Internet Service Provider: High Speed Wireless ISP |
| Clearwire is a wireless broadband internet service provider (high speed wireless ISP) providing high speed wireless broadband internet access in Abilene TX, ... |
| www.clearwire.com |
  |
| SurfCity Networks Broadband Internet |
| SurfCity Networks Broadband Verizon DSL High Speed Internet and Web Hosting. |
| www.surfcity.com |
  |
| ISP - Wireless Broadband Internet Provider, iBurst, ADSL Broadband ... |
| Australian ISP providing business dialup, high-speed broadband, network access and datacentre services. |
| www.chilli.net.au |
  |
| NTL - Broadband Internet - Digital TV - Phone - Cable ISP ... |
| Digital Television Network. |
| www.ntl.com |
  |
|