Undoubtedly youâve read by now about Sinclairâs computer network being hacked and held for ransom. The company reported that it was locked out of just about everything on its network. As one employee explained the situation, he had no email, phones, file video or graphics. The newscasts that did air were essentially âtalking head radioâ â looking like a throwback to the âold days.â
Could it happen to you? You betcha! And if it hasnât happened to you, itâs probably because of equal parts of good computer networking practice and alert computer users and a large serving of âthey havenât gotten to me yet.â But in time, they will!
Implementing good computer networking practice is the easy part. All it takes is a little money and adding some protection features that make your computer network operation a bit more inconvenient for users. Yes, the more secure your network the more your users will face inconvenience, like frequent password changes, limited access privileges tailored to each user, and inconvenient additional steps to verify usersâ identity and to access secured data.
The biggest threat to any stationâs computer network is its users. And the biggest threat here is the âphishâ email. Email that looks exactly like a legitimate email but contains a âpayloadâ that compromises your network when the user clicks on a link, a picture, or other âclick-bait.â A cute cat picture can kill your network!
Particularly in fast-moving news and sales operations, stopping to carefully inspect an email often isnât part of the daily routine. Youâre regularly expecting email from the home office, from clients, and from news sources, so when one appears you just click away! Bingo â you may threaten your network.
Even if your stationâs staff is fully vigilant, outside providers who have access to your network can introduce malware. If you allow access to your network by a voice guy, by an ad agency, or by employees or contractors working from home (and arenât we all at least in part) youâve opened up another avenue for malware to strike. Your network administrator should sharply limit privileges from all users to just the ones they need, and all uncontrolled outside connections should only be able to deposit their contents in a safe place. Segment or segregate the operations network from the sales network from the engineering network from the â well, you get the idea.
Never, never allow users on a fairly unsecure network (like nearly all peer-to-peer local area networks) to use their computers with âadministratorâ rights. Users should have âuserâ rights â everything they need to do their work, but absolutely nothing beyond. And really limit access from âbrought in from homeâ computers!
Weâve just touched the surface. You wouldnât leave your keys in your car â donât leave the keys to your network where anyone can access, modify, or delete anything they shouldnât.
A bit of inconvenient security now can save a huge amount of dollar loss later! Pay a little for good computer network security now or pay mightily for not having it later! Just ask the folks at Sinclair Broadcast Group!