Spring Festival Long Holiday Safety Handbook _ Internet Surfing

Source: Internet
Author: User

CNET Science and Information Network February 5 Taipei Report (Wen/Zhongtailing) in a few days is the Lunar New Year, followed by the seven-day New Year holiday, we are very happy. But it may not be good news for corporate networks, because vacations may also mean the empty window of information security.

Based on past experience, cyber attacks will rise every holiday. The network security company trend Science and technology explanation, many virus or the malicious program's author are the student, this is why each year summer and winter vacation not only studies the shortage to become serious, the network attack situation also more. The Spring Festival holiday coincides with the students ' winter vacation, which is naturally no exception.

Symantec pointed out that many students are not necessarily serious attacks, because such attacks are mostly "fun, try" nature, there is no specific goal. There is no effect if appropriate precautions are available. But because many companies are not stationed during the new year, if there is a loophole in the virus or someone to swoop in, it may lead to catastrophe.

This article brings together a number of security practices at the individual and corporate levels that network security companies offer to keep your computer and your network safe from the New Year's holidays.

(i) Internet access at home:

During the new year, computers in the home are the most important victims of malicious programs and attacks.


Attack Mode:
Malicious program: Close to the New year, friends and company line number often send electronic New Year greeting card. However, viruses, Trojans may also be invisible, one inadvertently that may be poisoned or planted back door procedures, instant Messaging (Instant messaging) is also a potential source of malicious program transmission channels.

Phishing (phishing): Many people surf the Internet at home in the New year, online shopping and playing on-line games become a great fun to kill time. And the new year may receive emails from reputable banks, ask you to confirm the password, or play online game when someone came to the information, litigation you can go to a website to download some of the more skills of the program, the results Wolf, the Trojan or spyware download down, and was stolen bank or online game passwords and so on.


Personal Computer Protection:
Regularly updated to the latest virus definition files. Trend technology suggests it is best to use antivirus software that can catch spyware. Symantec antivirus software should have a personal firewall, intrusion detection function, the former can truncate the zombie computer (Zombie) and the hacker's line, and intrusion detection can be when someone from the Internet, such as the intrusion of IE to warn. These measures can now be used to correct the time bomb in the computer.

Download patch patches. such as Microsoft periodically release the risk level of the program Vulnerabilities and security update notification, should immediately download the update program.

form a safe Act. Do not open the unknown graphics and implementation files, not unfamiliar with the site to leave important personal information.

(ii) Enterprise level

Although there is no one on the internet during the Chinese New Year, there may still be loopholes and security attacks such as hackers. Because the enterprise's systems are more and more complex, and contain more important information, for the company IT staff, they should not only ensure that the company's employees do not have to do personal computer security precautions, but also to ensure that the server, network defense, as well as the overall security management.

Patch vulnerabilities: Small to Instant messaging (IM), mail software, browser, large to the operating system, database software, routers, switches, as long as there is a loophole exists without timely repair, it is possible to cause the invasion of poisonous insects (worm), causing various degrees of damage. Common operating system, browser vulnerabilities, should be patched as soon as possible.

Appropriate password settings: If the system administrator is using the "lazy password" (such as Passworod or company abbreviated as a password), or even "slightly more complicated lazy password", are easy to guess and people into the. Make sure your password is set up before the holidays.

Safety contingency measures. Usually for information security events to do a good job, to ensure that the contingency measures, such as the system was invaded by WHO to control the processing; set up a firewall, intrusion detection system occurs when the incident, the issue of telephone messages. If the company does not have a proprietary IT staff and is responsible for the maintenance of the antivirus product distributor, the Distributor should be asked to advise on the security measures for the new Year.

There is no need to open the system as close as possible. Although the computer can be opened to ensure the immediate updating of the source code, but more than one computer or server connected to the Internet, one more chance of being invaded. Of course, this also means that on the first day of the New Year, IT staff is the first thing to download security updates, as soon as possible delivery to each computer.

Backup: This is the last line of defense to prevent information from actually being compromised (or even when the entire computer is stolen), and to respond to the information in the quickest possible time.

Security companies point out that if the time is not allowed to do any security drills, at least should be good anti-virus software and repair the operating system vulnerabilities.

Long-lasting security for the company depends on the good habits and protective measures that individuals and businesses usually use. Mend, still not late, do the basic protection, your company can rest assured that the holiday, after the leave to get started red envelopes.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.