Continued from page 1
With advances of technology, monthly fees for home security monitoring are reasonable for service they provide. Be warned: not all monitoring companies have same capabilities when it comes to quick response. Thatís one reason why itís a good idea to make sure that any security company you choose has a UL certification. This can be critical as it indicates that security company has met stringent standards for management system compliance (such as a back up source of power). The same methodology should apply for a security software provider. Just because they say theyíre best, doesnít mean that they are. Due diligence is userís responsibility. Your information is too valuable to be taken lightly.
Both home security and cyber security are similar to having insurance. You have it, but you hope you never need it. And if you do need it, you want a company or vendor that has a history of excellent customer service.
There are those people who think that having a firearm is all they need for protection. While that may hold true in some form, a firearm wonít let you know if someone is trying to enter your home through back door while you are sleeping and notify you or authorities. Another common perception is that a watchdog will alert a homeowner to intrusion, but again, manís best friend sleeps 10 to 12 hours a day and canít notify police.
There are some computer users who claim that they can detect a virus by email that is sent with some obvious taglines meant for user to open and infect machine. Not all viruses are in emails, although that is most common form. They can also be uploaded to a website, or embedded in Java Applets or Active X controls.
Trojans, which can log all of users keystrokes and sites visited, are secretly downloaded in form of free games or free software, and are undetectable by anti-virus software. This is preferred method of attack by a hacker on a machine. By not altering performance of a machine (like a virus or worm does), user blissfully continues to use their machine to make online purchases, and enter sensitive information, thinking they are secure, while Trojan secretly records all of information and will simply send all of userís information at designated intervals to hacker.
Many times a decision about security measures for your home or computer is based on budgetary constraints. But always consider what it is that you are protecting and how much you would pay to get back whatever was stolen, lost or destroyed if an unfortunate event occurred in your life.
Paul has been involved in network security for over 4 years and is still looking for answers!