Network Health Archives - MD Computing Blog http://www.mdcomputing.com/category/network-health Keeping you and your computers, email, websites, and networks healthy Fri, 17 Feb 2012 18:52:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 Why Cloud Computing Is More Secure http://www.mdcomputing.com/why-cloud-computing-is-more-secure http://www.mdcomputing.com/why-cloud-computing-is-more-secure#respond Thu, 12 Jan 2012 18:51:11 +0000 http://www.mdcomputing.com/?p=119 Cloud computing is considered to be the next major advancement in the technology world. However, there still tends to be a layer of mystery and confusion regarding cloud computing and its security.

What is Cloud Computing?

cloud computingSimply put, cloud computing is the concept of hosting servers, applications and services offsite at a remote location. Most people are already “in the cloud,” even though they do not realize it. For example, if you have ever uploaded photos to Facebook or any other photo hosting site, you have successfully utilized cloud computing. When you upload the photos, they still reside in their original location, but they are also stored on the servers at Facebook, Flickr or the photo hosting site of your choice. Once your photo is uploaded, it is then accessible from any computer with an internet connection that can access that site. This is the most basic, and most popular, form of cloud computing.

Cloud Computing Security

While the technology involved is fairly straightforward, many individuals and industry experts have raised an eyebrow at the potential for security issues arising from the use of cloud computing. Fortunately, this is an unfounded worry, and the security offered by cloud computing often far surpasses the levels of security available to most individuals and businesses. Unlike a traditional, in-house solution, cloud computing offers many levels of advanced security controls that are typically too expensive or complex for individuals and small to medium-sized businesses to utilize.

Secured High-Tech Datacenters

The first level of security that cloud computing offers is the ability to make storing data in highly secured high-tech datacenters accessible to individuals and businesses of all sizes. With cloud computing, end users no longer have to shell out big bucks to create a secure environment to house their servers or applications. The hosting companies that run cloud-based services provide this level of security for their clients. The data centers used for cloud computing offer several key security benefits that are typically out of reach to the vast majority of end users, including:

• Secure locations that utilize stringent levels of physical security
• 24/7 professional staff that monitor and maintain the location
• Server room environments carefully monitored for heat and other environmental variables
• Buildings specifically designed to house high-tech networking equipment utilizing fire suppression units that do not spray water on equipment

The secured datacenters used by hosting companies are able to combine high-tech security with the latest and greatest in server room environment controls. This creates an environment that makes theft of equipment nearly impossible while providing the best protection against fire and heat available.

Professional Security Patching & Updates

Another key security advantage of cloud computing is the way security patching and updates are handled by the hosting companies. Each month, Microsoft and other vendors release numerous important patches and updates that need to be applied to servers. As a result, a business that hosts their own application or data servers onsite battles a seemingly endless barrage of security patches. Often, this activity alone will tie up IT resources and result in expensive server downtime. Due to the way patches affect operating systems and applications, many smaller businesses are forced to pay high-cost consultants to handle this activity, so they can remain secure.

Cloud computing can take this persistent headache out of the picture. With many cloud-based solutions, the hosting company will maintain responsibility of keeping the servers and applications they manage fully patched. The patching and updates are performed by skilled IT professionals at the hosting company. This results in applications and servers being more secure, and it takes this overwhelming responsibility out of the hands of individuals and businesses.

Cloud Computing: Not a Security Lightweight

These benefits alone offer greater levels of security than many businesses and individuals have access to on their own. This combination of highly secured locations and professionally maintained machines creates an environment that greatly lowers the amount of risk incurred while providing high levels of availability and accessibility to vital data, applications and servers. Cloud computing might be relatively new to the limelight, but it is no security lightweight.

]]>
http://www.mdcomputing.com/why-cloud-computing-is-more-secure/feed 0
Network Security Basics For Your Business http://www.mdcomputing.com/network-security-basics-for-your-business http://www.mdcomputing.com/network-security-basics-for-your-business#respond Wed, 21 Dec 2011 21:09:44 +0000 http://www.mdcomputing.com/?p=66 Network security is often a confusing and frustrating subject. It seems as though no matter how many precautions are taken, hackers can still manage to find a way in. While it may be true that there is no such thing as fool-proof network security, there are many ways that any business can drastically improve.

email phishing hookA layered method is the best way to approach network security and make your network a hard target to tackle. By adapting these five layers, you can effectively increase the level of network security your business has and thwart many would-be attackers.

Layer one: Secure your wireless connections

Wireless access points provide convenient network access for employees and contractors, but unfortunately they also provide convenient access to hackers and attackers as well. All wireless access devices should either be secured or disabled if they are not in active use. Active devices should use WPA2 security at a minimum and utilize strong passwords that are not easy to guess. Additionally, an easy way to gain an extra layer of security is to set your wireless device to not broadcast its network name, or SSID.

Simple wireless security practices include:

  • Using WPA2 security
  • Enabling MAC address filtering
  • Setting strong passwords that are periodically changed
  • Limiting the broadcast range of your access point
  • Disabling SSID broadcasting

Layer two: Avoid suspicious emails

Innocent looking emails are the number one way attackers gain entry to networks. Often, innocent emails will carry dangerous payloads that can install viruses and other malware on PCs, even those that use updated antivirus software. The best way to avoid these threats is to immediately delete suspicious emails without opening them. If you do not recognize the sender, or the message seems at all suspicious, the best course of action is to simply delete the email.

Layer three: Set up a proxy or web filter

Malicious websites are another top attack vector utilized by hackers and other nefarious attackers. Even an innocent looking website has the potential to download harmful files to your PC. The best way to avoid this scenario is to use a proxy or web filter that automatically blocks users from browsing to these sites. A proxy can prevent users from accidentally stumbling upon a site that does damage to their PC and your network.

Layer four: Create strong password policies

Passwords are one of the simplest ways to keep attackers out, but they are also one of the most overlooked aspects of network security. Simple password policies can create a secure environment that is not easily breached.

Strong password policies include:

  • Changing the default passwords on computers and network devices
  • Requiring that network passwords are strong passwords that include letters, numbers and special characters
  • Educating employees to avoid writing down passwords and never keeping passwords that are written down in visible or easily accessible locations
  • Educating employees to never share passwords with anyone

Layer five: Audit your security regularly

The best way to ensure your network is secure is to have security audits performed regularly. A good auditing company can spot security loopholes before attackers can, and this allows you to tighten your security before your network is attacked. By working with a trusted auditing company, it is possible for your network security to stay one step ahead of the attackers. The auditing company can spot security holes that your staff may not be aware of, and the auditors are often able to provide detailed guidance about what security measures need to be taken.

Network security is a tough subject to tackle, but employing layers of security can easily help your business become more secure. A layered approach makes your company a difficult target to tackle. When hackers face obstacles like the ones created by this approach, they will often give up and seek out easier targets. While it may be impossible to create a network that is 100 percent secure, these methods will help you keep bad guys out and create a network that is not easy to attack.

]]>
http://www.mdcomputing.com/network-security-basics-for-your-business/feed 0