This past Saturday, I open the Washington Post and discovered what I have always thought was the case in an article title “Cyberspace the fragile frontier” written by Brobert O’Harrow Jr. You may wonder what I meant by “the case”? In this age of connectivity, networktivity (yes I made that word up) where we are all connected by devices, network, social-media, and other systems connected to each other. It begs the question- what if one system (device) gets compromised? What happen to the rest of us carrying these devices around in our hands, pocket, and bags?
OK, still wondering what I am talking about? It’s the devices we all have this days, cell phones, smartphones, iPods, iPads, small mobile computing devices and as I stated in the opening is the case is a case of compromised devices or hacked into. The report in the Washington Post reported a successful hacking of the iPhone, apparently up till now the makers of iPhone considered their OS difficult to hack or break in.
Last week, I hope you also heard of the cyber threat in cyberspace. If not at least you must have heard of stuxnet, botnet and all the other nets. The most recent attack in cyber space “Flame” is even more sophisticated than the previous ones. So why I am posting this on my blog? Why should this concern you, my small and mid-size business owner audience? Well it concerns you because most small business owners that I speak to often tells me “We are not a big company”, “We have nothing the bad guys wants” and I tell them the dynamite fishing story that was told from Comptia Security conference 2011 on cyber security.
As a small business Owner, Government Contractors here are three (3) tips you can use to keep your systems secure from this cyber criminals and threats.
- Make sure your systems desktop, server, mobile devices) are patch as fast as possible (avoid ZERO DAY vulnerability)
- Don’t share USB devices without securing your USB, and implement scanning upon inserting USB to your computer or devices. (this will prevent 90% of the trouble)
- Educate and inform your employee (users) of this cyber security threats.
The article that I mentioned above revealed the ZERO DAY security vulnerability and defined as the time between which securities vulnerably are discovery and the release of a patch fix to these vulnerabilities. Hackers explore this time to do their damage, compromise and steal information or even use compromised systems to launch other attack on others and nations included.
To learn more about securing your network, servers, desktops or even your mobile devices, call us at Smarthost Design Technologies – 301-576-1122 ext 101