peak-10

peak-10

Written By Jeffrey Gitomer
@GITOMER

KING OF SALES, The author of seventeen best-selling books including The Sales Bible, The Little Red Book of Selling, and The Little Gold Book of Yes! Attitude. His live coaching program, Sales Mastery, is available at gitomer.me.

Peak 10

Top Network Vulnerabilities

1)Default Installs of Operating Systems and ApplicationsMost software, including operating systems and applications, was created anywhere from 1 month to 2 years ago by the time you purchase and install it. Because new vulnerabilities are being found everyday, there is a good probability that many have been discovered since the CD was released from the manufacturer. The installation programs that come with the software, therefore, have not been updated with the latest patches and can create the most dangerous security vulnerabilities for users. Those unpatched systems, applications, and services provide paths for attackers to take over or exploit your computer systems.

How to Protect Against It: regularly install security patches. Peak 10 will keep up with patches so you don’t have to, loading all patches regularly for clients, through its “System Admin” offering.

2)Non-existent or InComplete Backups of Your DataApproximately 43 percent of US businesses never reopen after a disaster and 29 percent close within three years, all because of lost data (source: US National Fire Protection Agency). Without a proven method for backing up and restoring data, businesses are susceptible to ruined and lost data. In addition to having a daily backup solution, businesses need to not only verify that these backups are actually working, but physically protect these backup tapes.

How to Protect Against It: Backups should be performed on a daily basis. The minimum requirement in most organizations is to perform a full backup weekly and incremental backups every day. At least once a month, the backup media should be verified by doing a restore to a test server to see that the data is actually being backed up accurately. Peak 10 offers comprehensive backup and restore solutions for customers.

3)No Passwords or weak PasswordsPasswords are often the first line of defense in protecting systems against attacks. But, if an attacker can determine an account name and password, he or she can log into your network. Easy to guess passwords (such as your name, your spouse’s name, etc) are a big problem; having no passwords are an even bigger problem.

How to Protect Against It: make sure your system is password protected and require complex passwords (those requiring a letter, number and upper case/lower case combination). Also, require that passwords be changed every 30 days.

4)Disgruntled EmployeesAccording to the FBI, corporations attribute 70% of all network intrusions to internal sources. These intruders, often times a disgruntled or terminated employee, are out to sabotage systems or steal information.

How to Protect Against It: make sure you have up-to-date physical security that prevents internal intrusion. This can include: pin card access where pin #s can be quickly deactivated, biometrics where employees’ fingerprints can be deactivated, combination locks that can be easily changed, etc. Peak 10 has the state-of-the-art security to immediately lock-out any unauthorized employees.

5)Power Surges/OutagesAccording to the Contingency Planning Corporation, the #1 cause of downtime is a power outage. Some people don’t even have UPS systems for their systems, and most people who do have UPS systems do not check them. Batteries in these systems need to be replaced every two to three years. Standard UPS systems “less expensive standby” types do not actively test the fail-over to battery increasing the chance that you think you are protected, but when you need it your battery may be dead.

How to Protect Against It: uninterruptible power supplies (UPSs) and generators provide immediate backup power in the event of a commercial power failure. Peak 10 facilities are engineered with a redundant, “inline” always active uninterruptible power system and “standby” backup generator to deliver seamless power to its customers. These systems are monitored 24x7x365 and tested regularly.

6)No Firewall or Holes in Your FirewallBecause it is virtually impossible to secure all the systems in a facility and keep them secured, businesses must use perimeter protection systems such as firewalls to protect their sites. A firewall is a gateway that protects companies from unauthorized or unwanted access. It is very much like a security guard at a government facility that protects employees from unwanted outsiders. A firewall is the most common defense device on most networks today and is a critical component to network security.

How to Protect Against It: It can be a daunting task to pick the right firewall for any organization. Peak 10 works with customers to select the right firewall solution and can fully implement and manage it for them.

About Peak 10, Inc.Peak 10 is Charlotte’s premier managed hosting provider for business-critical applications. The company’s state-of-the-art data centers offer comprehensive hosting, co-location, Internet access, management/monitoring, security, and storage solutions. Peak 10 has data centers in Charlotte, North Carolina and Jacksonville, Florida, with plans to be in additional Southeast cities by year-end. For more information, please call 704-264-1010 or visit www.Peak-10.com.

2001 All Rights Reserved – Don’t even think about reproducing this document without writtenpermission from Jeffrey Gitomer and Buy Gitomer o www.gitomer.com o 704/333-1112