Is your service providers connection safe..

Is your service providers connection safe..

If you ever thought you didn't need to worry about the security of your home computer because there's nothing that would be of possible value to anybody else -- you might be in for a surprise. Hackers find home computers, especially those with DSL or cable connections to the Internet, very appealing. If you are a broadband user, your computer is more susceptible to hacker attacks because you have an “always-on” connection to the Internet.

Your computer stores more information than you may realize -- all of which is potentially useful to someone who is out to steal your money or your identity. Home computers are also much easier to break into than a heavily-fortified, secure corporate network.

While some hackers and identity thieves are out for the sole purpose of stealing your personal data, many are simply looking to hide behind your computer and use it to attack other computers without your knowledge. By hiding behind your Internet connection and IP address, hackers won’t leave a trail, making it more difficult -- if not impossible -- to be tracked down.

Threat No. 1: Getting hijacked
Hackers like to hide behind home computers with broadband connections. Home users with high-speed Internet connections are attractive to hackers because they can use port scans to see that you’re online, so they can take over your computer without your knowledge. If you have a broadband (i.e. high-speed DSL or cable) connection, you're more susceptible to hacking than people with dial-up modems. Why? Because personal computers with broadband are connected to the Internet any time the computer is on. And because the connection is ultra-fast, hackers find it more fun and efficient to use them for disruptive purposes than a (usually much slower) dial-up modem.

Threat No. 2: Being wide open
Hackers routinely scan IP addresses for open ports. Essentially, ports are doors that an application goes through to communicate through the Internet, so when hackers run a port scan, they're looking for ports that are open. They can see that there's a live computer at a certain IP address. And while dial-ups often connect using different IP addresses, your broadband IP address is more likely to be static, which makes it easier for a hacker to find you.

A hacker could install an application onto your system without your knowing it, so that anytime you're online, the application goes through your Internet connection and calls out to say, "I'm open, I'm available, come and use me." Use me for what? Hackers may not want your data so much as they want to hide behind your computer and use it to attack other computers. So, without being aware of it, you could be helping a hacker do a lot of malicious mischief.

Threat No. 3: Compromising valuable data
You may have more on your computer than you think you do. You might think: "I just use my computer for email, research and connecting to the Internet," many users say, or, "I don't have enough money in my checking account to make it worth anybody's time or energy to steal it." But for hackers, that's not necessarily the point. They're not targeting your computer specifically; they're looking for any machine with an open port. And broadband connections mean that whenever your computer is turned on, even if you haven't opened your browser to access the Internet, you're vulnerable to attack.

If you do online banking, trade stocks, or buy anything over the Internet, you're a potential target, even if you're just surfing. Do you use financial software such as Quicken or Microsoft Money? Then your private financial information is on your hard drive. Even if you don't shop or bank via the Internet, you probably keep a copy of your resume on your computer.

Your resume would, in a one-page document (probably and conveniently named "resume" on your desktop), give a hacker almost all of your personal data: where you work, your home address and phone numbers, previous employers and where you went to school. And this information is potentially very valuable to any hacker interested in identity theft -- because with this information, that hacker could find your credit card and social security numbers and, pretending to be you, buy just about anything over the Internet.

Threat No. 4: Sneaking past loose security
Home computers are easier to hack. If you think about it, the Internet is just a giant network of connected computers. So when you log on, you've essentially made your system open to anybody else who's online -- and some of those people do not have your best interest at heart.

"Yes, but," you might say, "hackers should be going after big corporations because they have tons of money and millions of customers in their database." That is true. And most of these major corporations also have full-time IT staff who put all kinds of security measures in place -- firewalls and anti-virus programs and such. Imagine yourself as a burglar. Would you rather rob a well-guarded bank, with bars, locks and safes, or would you hit a house that has its windows and doors open with no alarm system? Why break into something that's heavily-fortified and secure when you could easily target a wide-open home where the owner may not be aware of his or her vulnerability, and therefore may never discover the break-in, enabling you to go back in anytime you want to?

Don't make it easy for an intruder to find your home computer. You safeguard your home by locking your doors, so why not make your home computer more secure as well? For starters, consider installing a personal firewall to protect you from hackers that are trying to scan your personal files, steal data or damage your system. Also, install anti-virus and security software to further protect your computer from hackers, viruses and other privacy threats.

These are just a few of the ways hackers can access your personal info and take over your computer and life.  This is why computer and network security are key , even with your home computer. By Jennifer Martinez

N.Nandakumar Kartha

Speaks about COST EFFECTIVENESS in Management. Providing work experience to job aspirants #Blogger # Trainer # Youtuber # LinkedIn

9y

informative. thanks

Like
Reply

To view or add a comment, sign in

More articles by James Stokes

  • How To Present Your Self When Seeking Employment & Why Its Important.

    You can take a college course on just about anything nowadays. There's even a class on how to talk to your parents.

  • Why Local SEO marketing so Important...

    Businesses are consistently trying to find ways to expand into new markets, often times so much so that they forget the…

  • Cloud Hosting vs Dedicated Server

    It’s a decision that every company, IT Directory faces: where to host all that data. In a world where we rely on…

    1 Comment
  • Delighted with Managed DNS with CloudfloorDNS

    As part of making IT Operations better, faster,and stronger for 2016, I recently embarked on a mission to migrate our…

  • Growing Your Facebook Like A Pro

    I have realized the potential of Facebook as a community-building tool, growing our fan base ‘likes’ in just a few…

  • VOIP & It's Challenges In Technology

    For many years voice telephony has relied on the public switched telephone network (or PSTN) which works through the…

  • Secrets of success with small business owners.

    Small business is the lifeblood of our economy because it adds passion and enthusiasm to all it touches. Sure, the…

    1 Comment
  • "Pay It Forward" Lets Endorse

    There is nothing better then knowing that people believe in your ability to perform a task or project. To feel…

    1 Comment
  • Endorse your connections today...

    How to make endorsements work for you by endorsing the profiles of others in your network. Why would you want to spend…

    2 Comments
  • Our life without computers

    In our present life everything is connected with computers technology. We use computers at homes, schools, banks…

    2 Comments

Insights from the community

Others also viewed

Explore topics