In keeping with our mission to see our clients succeed, NVT is available 24 hours a day, 7 days a week. We understand that 24/7 support is especially important to our clients. When companies are faced with a crisis situation, they need a quick and responsible solution. This is especially true of smaller companies who do not have full time IT support
Your computer is a popular target for intruders. Why? Because intruders want what youíve stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services.
But itís not just money-related information theyíre after. Intruders also want your computerís resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders canít be found, they canít be stopped, and they canít be prosecuted.
Why are intruders paying attention to home computers? Home computers are typically not very secure and are easy to break into. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target.
No matter how a home computer is connected to the Internet, intrudersí attacks are often successful. Many home computer owners donít realize that they need to pay attention to computer security. In the same way that you are responsible for having insurance when you drive a car, you need to also be responsible for your home computerís security. This document explains how some parts of the Internet work and then describes tasks you can do to improve the security of your home computer system. The goal is to keep intruders and their programs off your computer.
How do intruders break into your computer? In some cases, they send you email with a virus. Reading that email activates the virus, creating an opening that intruders use to enter or access your computer. In other cases, they take advantage of a flaw or weakness in one of your computerís programs Ė a vulnerability Ė to gain access.
Once theyíre on your computer, they often install new programs that let them continue to use your computer Ė even after you plug the holes they used to get onto your computer in the first place. These backdoors are usually cleverly disguised so that they blend in with the other programs running on your computer.
To request help in securing you computer click here