With all of the vital personal and business data being shared on computer networks every day, security has become one of the most essential aspects of networking. No one recipe to fully safeguard networks against intruders exists. Network security technology improves and evolves over time as the methods for both attack and defense grow more sophisticated.
Physical Network Security
The most basic but often overlooked element of network security involves keeping hardware protected from theft or physical intrusion.
Corporations spend large sums of money to lock their network servers, network switches and other core network components in well-guarded facilities. While these measures aren’t practical for homeowners, households should still keep their broadband routers in private locations, away from nosy neighbors and house guests.
Widespread use of mobile devices makes physical security that much more important. Small gadgets are especially easy to leave behind at travel stops or to have fall out of pockets. News stories in the press abound of local residents having their smartphones stolen in public places, sometimes even while using them. Be alert to the physical surroundings whenever using mobile devices, and conscientiously put them away when done.
Finally, stay in visual contact with a phone when loaning it to someone else: A malicious person can steal personal data, install monitoring software, or otherwise “hack” phones in just a few minutes when left unattended.
Password Protection
Passwords are an extremely effective system for improving network security if applied properly. Unfortunately, some don’t take password management seriously and insist on using bad, weak (meaning, easy to guess) passwords like “123456” on their systems and networks.
Following just a few common-sense best practices in password management greatly improves the security protection on a computer network:
• set strong passwords, or passcodes, on all devices that join the network
• change the default administrator password of network routers
• do not share passwords with others more often than necessary; set up guest network access for friends and visitors if possible
• change passwords when they may have become too widely known
Spyware
Even without physical access to the devices or knowing any network passwords, illicit programs called spyware can infect computers and networks, typically by visiting Web sites. Much spyware exists on the Internet. Some spyware monitors a person’s computer usage and Web browsing habits and reports this information back to corporations, who use it to create more targeted advertising. Other spyware attempts to steal personal data. One of the most dangerous forms of spyware, keylogger software captures and sends the history of all keyboard key presses a person makes, ideal for capturing passwords and credit card numbers. All spyware on a computer attempts to function without the knowledge of people using it, thereby posing a substantial security risk.
Because spyware is notoriously difficult to detect and remove, security experts recommend installing and running reputable anti-spyware software on computer networks.