Simply using basic protection methods already available to you can deter most security breeches. Yet, it is surprising how many major corporations do not fully utilize rudimentary, yet ever changing, safeguards. Don’t put yourself in generic and default operating modes that leave you open to commonly found weaknesses. Protect yourself with know-how.
In the old days when the pen was mightier than the sword, information was kept under lock and key. Today, when information can be more valuable than gold, our locks and keys are virtual. Just as knowledge is the key that unlocks doors, it takes knowledge to lock them as well. Protect what is yours by minimizing the risks. Technicians from our Computer Sciences department have researched, compiled and condensed information to show you how. Come under the umbrella of Protective Countermeasures and let the expertise of our specialists work for you.
US Computer Emergency Readiness Team (CERT)
- Glossary of Virus Terms
- Computer Emergency Readiness Team (CERT): Tips
- Common Vulnerabilities and Exposures (CVE)
- National Vulnerability Databse (NVD)
- What are the threats to your network?
- What kind of protection is available for a network?
- What kind of protection do you need for “your” network?
- Several things to ensure that security is routine
- Main steps in formulating the security policy
My computer and the internet:
- Security for the Internet, broadband, and your computer
- What’s the worst that can happen?
- How can they do this?
- Why would they go after me?
- Why not just turn off my computer?
- What can I do to protect myself?
Wireless Security at a Glance
- Basic Wireless Security
- Password and Username
- Device Addresses
On the Web – Sponsored by the U.S. Department of Homeland Security (DHS):
Common Vulnerabilities and Exposures (CVE)
National Vulnerability Databse (NVD)