Another company suffered a security breach, according to the NYTimes today. What’s the big deal, you might say, because companies getting hacked into isn’t really news.
Another company suffered a security breach, according to the NYTimes today. What’s the big deal, you might say, because companies getting hacked into isn’t really news.
A common technique used b y hackers is to guess the passwords for administrative users to gain access to a server, and from there compromise vast swatches of a system. Hackers are constantly devising powerful password cracking tools to see if they could grab a system admin or network admin’s password.
While strengthening your network and perimeter security does keep potential attackers away, you do want people to access your web sites and web application, of course. Unfortunately, while most users access your applications and web sites for legitimate purposes, you can’t control the user input.
All network components log their activity, but most companies don’t have a formal policy of reviewing the logs on a daily basis.
Internet accessing client systems and network devices are always a potential source of threats from hackers.
Network configuration includes the configuration of all network devices such as firewalls, routers and switches. Often times, an initially secure network configuration becomes somewhat insecure over time, as occasional configuration changes are made to the network to accommodate temporary needs.