As the adoption and reliance on computers, networks and broadband Internet connectivity grows with small and medium size businesses, so does the threat against security.
Security threats can come in a number of forms that range in damage from a mere annoyance to theft of critical personal or business information. Some of the more popular security threats include:
• Security holes in operating systems and software applications that can be exploited by hackers who can penetrate or disable a computer or whole network.
• Direct attacks can be from a disgruntled worker, unhappy customer, competitor or a curious hacker trying to penetrate your business network.
• Viruses often spread over e-mail contact lists and instant messaging networks, by disguising themselves as legitimate attachments. Users activate the code unknowingly, infecting their system or network with the virus.
• Worms are similar to viruses and much more common. Unlike viruses, worms do not attach themselves to any other software and are self-sustained.
• Trojan horses are software programs that capture passwords and other personal information, which can also allow an unauthorized remote user to gain access to the system.
• Spam can seriously damage productivity and represents a potential risk due to the current rise of malicious software delivered by spam messages.
• Spyware are malicious programs sometimes found in freeware or shareware software, as well as in file sharing clients. They can take a toll on system and network performance and send user data to the spyware authors.
Probably the easiest and most economical prevention someone can take to secure their company's computers and networks is to exercise safe computing habits. Using good judgment when surfing the Internet, visiting only well-known and trusted Web sites, being wary of e-mail attachments or e-mail from strangers and knowing the capabilities and limitations of your computer and software applications are all good safeguards.
The next step is to evaluate the risks and allocate the resources to securing your business computing and network investment. You should consider the harm that could be caused if a competitor retrieved customer information or if your business lost revenue.
Don't go overboard by investing time and money in resources you don't need. Consider outsourcing.
Many Internet service providers offer security services for small and large networks, but you also may want to consider a professional IT consultation, maintenance and repair business that tailor their offerings to small and medium size businesses.
For more information, visit www.TeamLogicIT.com or e-mail Brian Plotkin at [email protected].

keyboard_arrow_up