![]() ![]() However, small businesses with 10-15 workstations can hardly be expected to buy expensive hardware and employ a network professional. Big companies that manage huge numbers of users typically have expensive professional networking equipment and hire qualified and experienced network specialists. It’s obvious that a highly trained and competent administrator can provide resilient protection for most networks, while someone without the necessary experience and training can easily expose network users to significant risk. The weakest link in any IT security chain is in fact the user, and this holds true for network threats and devices also. Surprisingly perhaps, these seemingly innocuous devices can also offer a perfect hiding place for malware. ![]() ![]() Often poorly configured and vulnerable, such devices are an easy target for network-based attacks, allowing cybercriminals to quickly and easily gain control over a network. Typically, these devices will have been provided by a user’s ISP or bought to extend a user’s existing infrastructure and are usually managed by people who do not have any special technical knowledge. Network devices such as routers, access points and DSL modems are an integral part of today’s home and small office networks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |