Continued from page 1
Computer and Internet security are very wide-ranging and complex topics – so much so that even experienced experts specialize in just a subset of
whole. This may be part of
reason that a perception has developed among
general online populace that anything related to "computer security" is too difficult to be tackled by anyone other than an expert.
So consider
enigma we are presented with if that's all true.
On
one hand, you'd have to be bereft of all five senses and living on Mars not to know there is a sub-culture of Internet denizens who get their jollies by interfering with, stealing from and generally harming other people. We all know this. Logically we must then understand that if we connect to
Internet, we become potential victims of these cyber-grubs. But, on
other hand, we just know that we are powerless to do anything about it because it's "all too hard".
The big corporates are OK – they can afford to hire those experts and specialists I just spoke of. But what about
non-IT-expert,
average computer user and/or small business operator – what do they do for protection?
Well, I am going to let you in on a little secret. A secret that, if you take it seriously, just may save your business in
not too distant future.
A lot of what you have been led to believe is complete garbage.
Many experts treat average PC users as if they are imbeciles; many others know better but they want you to think you are an imbecile anyway. It's in their vested interests to have you thinking like that. As long as you "know" that security is just "too hard" there'll be an inflated demand for their services.
Don't get me wrong. There are some security issues that really are very complex and well beyond
ken of mere mortals. Such situations do demand
services of highly skilled specialists. Even basic security relating to mid- to big-business networks requires extensive technical knowledge.
But as a small business operator, there is an awful lot you can do to safeguard against ever getting into a compromised situation, and to safeguard
privacy and integrity of your data.
That is, to safeguard
success you have already attained as well as that still to come.
In Part 2 well look at one of
biggest weaknesses in your Internet interactions –
web browser. And no, it's not going to be a knock-Internet-Explorer-fest. Throughout this series we are going to stick to practicalities and realities.
In
meantime I'd like to leave you with some homework. Here's a link to a detailed article I wrote concerning some urban myths about browsers: http://hackersnightmare.com/FreeContent/Browser_Wars.pdf
-------------------------

Bill Hely is an Australian technologist, consultant and author whose professional focus has been on advising and supporting small business operators in IT and Office Productivity - and rescuing them when they didn't heed his advice the first time around. He is the author of several books on technology for the business person, including the Bible of Internet and PC security "The Hacker's Nightmare" - http://HackersNightmare.com