Articles

Post an Article
Secure your accounts: use two factor authentication and avoid ransom demands
Server, networking and security

Secure your accounts: use two factor authentication and avoid ransom demands

"Device hacked by Oleg Pliss. For unlock device, you need send voucher code by 100 usd/eur...

Data protection: A game changer for businesses
Server, networking and security

Data protection: A game changer for businesses

Individuals and businesses of all sizes are witnessing an explosion in the volume of data they...

BYOD – Creating a Balance Between Flexibility and Safety
Server, networking and security

BYOD – Creating a Balance Between Flexibility and Safety

Personal mobile devices and external data access promotes flexibility and improves employee...

Comparison of Virtual Server and Dedicated Server
Server, networking and security

Comparison of Virtual Server and Dedicated Server

A few years seem like a long time in the IT industry. It may seem like ages ago when nearly every...

Individual Cyber Security Health Check - Get yours now!
Server, networking and security

Individual Cyber Security Health Check - Get yours now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the...

Heartbleed bug - security flaw exposes millions of passwords
Server, networking and security

Heartbleed bug - security flaw exposes millions of passwords

http://www.cnet.com/news/heartbleed-bug-undoes-web-encryption-reveals-user-passwords/ "A flaw in...

Here's a new one for you - Bring your Own Cloud (BYOC)
Server, networking and security

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing...

How do we protect our children when we don’t understand cyber space ourselves
Server, networking and security

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we...

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses
Server, networking and security

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for...

Managed service professionals: the better option for SMEs
Server, networking and security

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals. ...

Server, networking and security

A server is a computer program that handles requests made by another program (known as a client). In practice, a server is used for managing networks and facilitating access to data and resources. Once these networks connect to the wider internet, the security of the network becomes an important consideration.

How does a server work?

A server’s basic function is to monitor ports for incoming requests from clients. On the internet, a web server receives a request from a user to view a certain web page and the server fetches and assembles that page before transmitting it back to the client’s web browser (using HTTP - the Hypertext Transfer Protocol) so it can be displayed and interacted with. This whole process takes a matter of seconds, and can sometimes appear to be instantaneous.

The internet is made up of thousands upon thousands of servers, all hosting information and data which can be accessed by millions of clients. Because of this, anyone with an internet connection is capable of setting up a server to make information available to millions across the globe.

What is computer networking?

Computer networking is how computers are able to communicate with each other. It consists of servers, clients and network infrastructure (such as wires, hubs, switches and more). Networking can be done at many different levels - from a simple Local Area Network (LAN) between computers which are nearby each other, to the entire internet itself, which is a complicated global network of technology and infrastructure.

Every network has a topology, which describes the arrangement of the system. There are many functional topologies and Network IT professionals specialise in determining the best one for a particular business. These experts are trained to provide more efficient hardware solutions and topologies to minimise response times and maximise security.

What is network security?

Network security is the level of protection offered by a particular network infrastructure to prevent unauthorized access, misuse, malfunction, modification, destruction or theft or both physical and software components of the network. Without proper network security, an organisation’s data may be at risk of malicious attacks by both individuals and automated viruses.

The most common types of network security which can be put in place include:

  • Access control: which prevents unauthorised users from accessing the network. Network Access Control (NAC) allows systems to prevent unrecognised devices from accessing servers entirely, or give them only limited access.
  • Antivirus and antimalware software: are programs which actively scan for viruses, worms, trojans, ransomware and spyware so they can be removed.
  • Firewalls: put up a defense which prevents untrusted traffic from gaining access to an organization's network.
  • Web security: controls an organisation’s web use and blocks threats which originate from their staff’s online actions. Typically, these systems prevent staff from accessing sites marked as dangerous or potentially dangerous.

Network IT professionals are able to consult further with their clients to ensure that more specialised security solutions are put in place where necessary, whether that means introducing extra encryption, utilising virtual private networks, managing wireless security or adding data-loss prevention processes.