login
   

Networks

Databases

Programming

Consulting

Security

Data Recovery

 

 

Home

Contact us
 
Networks
Programming
Security
Data Recovery
Consulting
Repair
Websites
Marketing
Training
 
References
About Us

 

 

Return to the home/small office main page

   A recent article in the “Processor” , a computer industry trade journal, noted that “People are often the weakest link in any security structure.” 

  You have, of course , anti-virus software , and you make sure it’s run every night. You are also sure to update it’s viral definition files  frequently. You also have a firewall ; so why do you need to worry what the “Processor” says ?   “Regardless  of all the protection your resources allow, all it takes is one employee inadvertently opening a tainted file in a spam message or on a disk brought in from home to unleash …” you know what.  

   We are pleased to help you with both the technical and the procedural side of this problem.  Our favorite story is of the son of a client ; the client bought and had us install a Cisco hardware firewall. His network stayed secure for six months – until – his son  put music sharing software (Kaza) on a computer behind the firewall , thus creating a huge security hole. It took just days until a Russian virus was sending credit card information back to Moscow. 

  Be careful and call us if you need help.

 

 

Home

   

Contact us