Network Security


We can help your home or company prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security starts from authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name, i.e. the password which is something you 'know', this is sometimes termed one factor authentication.

 

Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times.

 

  • “36% of vulnerabilities went unlatched in 2011.” -X-Force Trend and Risk Report 2011
  • “India accounted for roughly 14% of all spam registered today.” -X-Force Trend and Risk Report 2011
  • “41% of vulnerabilities disclosed are web application vulnerabilities.” -X-Force Trend and Risk Report 2011
  • “11% of vulnerabilities disclosed in 2011 had an associated public exploit released.” -X-Force Trend and Risk Report 2011
  • “28% of web applications tested had CSRF vulnerabilities.” -X-Force Trend and Risk Report 2011
  • “40% of web applications tested had XSS vulnerabilities.” -X-Force Trend and Risk Report 2011
  • “.tk and .com domains represented more than 70 percent of all new anonymous proxies.” -X-Force Trend and Risk Report 2011