While the computers used in office situations typically have lots of rules regarding internet usage and strong security measures in place, users frequently fail to protect the computer most vulnerable to online attacks: their home PC. Without the security measures of a workplace environment and with the freedom to roam the entirety of the internet away from the prying eyes of co workers, home computers are susceptible to every form of online attack.
Some users take the time to install vital anti malware software to help protect their home computers from attacks, and assume that this is enough. Yet, no matter how much we caution users against leaving their computers unprotected from malware, those pests are not the only threat they need to be guarding against. Many home networks remain susceptible to the ill intentions of unwanted visitors.
Piggybacking (the unauthorized use of bandwidth by an outside party) ranks as one of the most common offenses, and one of the least dangerous. With a wireless connection, piggybackers access an unsecured network, using it as if it were their own. While piggybacking is a relatively mild transgression, usually committed by a struggling college undergrad who can’t afford internet service, it can impact the availability of bandwidth on your network — resulting in slower response time when using the internet.
A more serious violation of network security occurs when an intruder invades your network for the express purpose of retrieving private information. Housed on your network are files of all sorts, personal data that you wish to secure against snoops and thieves. Without ample safeguards in place, unauthorized users can ferret sensitive information from your network and use it for their own design.
Even more troubling is when an intruder breaks uses your network to commit other illegal activities online. This can be achieved through either infecting your computer with a small program that gives your attacker partial or full control over the functions of your machine, or a direct invasion of your network. These types of attacks typically cause very little disruption in the performance of your machine, so many people whose systems are being abused in this fashion are unaware of what is being done with their bandwidth.
Many people unwittingly leave their networks open, unaware that they’re leaving themselves subject to the unwelcome motives of the less scrupulous denizens of the internet. Protecting yourself against these incursions is paramount, and one of the most effective ways to do so is the establishment of a firewall.
Firewalls do exactly what the term suggests, erecting a wall of protection that shields your network from outsiders, blocking entry to those who haven’t been granted authorization. They can be implemented through software or hardware to varying degrees, depending on just how secure you want your network to be.
For those looking to set up a firewall on their network, here are two great examples suggested by Geek Choice: Free Firewall Downloads.
Creating a firewall can be a complex process. If improperly configured your firewall will leave you no more protected than you were before its installation, and with a dangerous false sense of security. Should you have any questions on how to create your firewall, don t hesitate to give our office a call at 1 800 GEEK HELP (1 800 433 5435). We are here to help you.
Geek Choice, the best choice for on site computer service. At Geek Choice our number one goal is to help you. We specialize in Data Backup and Recovery, Wireless Networking, Network Setup, Computer Repair, Computer Setup, Spyware Removal, Virus Removal, and much more.
Author Resource:
Gregg Housh holds the position of Technician Manager at Geek Choice. At Geek Choice we solve computer problems such as: Slow computer, Virus Removal, Spyware Removal, Computer startup problems, Printer not printing, Not connecting to the Internet, Scanner not working, or the "blue screen of death".