People generalize , the importance of security and we have been told much about how to create a good, strong password and how to stay way from FREE unsecured Wifi hotspots when you want to pay online bla… bla…. Bla…
While all these are fundamental, the honest truth is if anyone really wants to attack your network or steal your private information in Zimbabwe, rest assured that the person is not doing this at any public Wifi hotspot, unless ofcourse he is a young prankster who has stumbled upon some crack ware, otherwise NO! He/she is right at your work place.
By Pardon Gatsi
Remember before you are worried so much about the exposure you have to be conscious of the most important aspect which is…
What and why do you think you may be reason, if you find one then quickly go ahead and do serious security, chances are high someone is already listening to your wireless traffic in search of the sensitive information.
Now you’ve secured your online life, it’s a good idea to look at your actual physical network of home or office PCs, laptops and other devices. Having a strong password on your Gmail account is one thing, but if someone can see exactly the kind of packets are going back and forth they can likely figure out what you’re looking at.
This is even a better way to steal password!
Securing your network is an important step, but it’s also fraught with problems you may never know exist, especially when you’re trying to balance convenience with security on a system provided by an ISP. Shared folders, Samba servers and SSH access are very common within networks, allowing you access files and folders remotely.
They’re also excellent attack vectors by those who can get into your network. Uninstalling or deactivating networking services you don’t use is a great way to increase security throughout your network. This is another convenience versus security debate – some networked devices (such as a Raspberry Pi or file server) you may wish to SSH into.
That’s fine, just make sure that to access them,you require a strong password. Same with the Samba shares for distributing music over your home network and the like. VNC you can probably turn off and on via SSH so you only access it when you definitely need to. There’s a lot of just thinking about how you interact with other devices over the network in terms of network security that can help out.
So how do you monitor your network to check if someone is already snooping or maybe on a #FridayHack, you may want to snoop around as well.
Lets dig in on that under network monitoring..