This ad will close in

Highway Robbery

As the number of individuals and companies traveling on the information superhighway increases, so do the incidents of computer-related crimes. Is your system at risk?

Only if your computer is set up with a two-way connection to the Internet, says Ted Beck, MIS manager for DeVilbiss Air Power Co., a manufacturing company in Jackson, Tennessee. "If you just log on to the Internet through a service provider, it's like walking into a shop, looking around and walking out. No one else on the 'Net can get into your system" Beck Explains.

However a computer system with a two-way Internet connection should be independent of the system that contains confidential information. If that's not possible, Beck advise, install "fire wall" software that crates a barricade which outsiders can't cross.

When programming your fire wall, Beck adds, make sure at least two people know the configuration. This prevents an employee from setting up a break in the wall that he or she may use later.

Page 1 2 Next »

Like this article? Get this issue right now on iPad, Nook or Kindle Fire.

This article was originally published in the January 1996 print edition of Entrepreneur with the headline: Highway Robbery.

Loading the player ...

Tim Ferriss on Mastering Any Skill

Ads by Google

0 Comments. Post Yours.