Top Trending: 5 Steps to Becoming a More Recognizable Brand

Highway Robbery

<b></b>
  • ---Shares
This story appears in the January 1996 issue of Entrepreneur. Subscribe »
Reader Resource

Apply now to be an Entrepreneur 360™ company. Let us tell the world your success story. Get Started »

As the number of individuals and companies traveling on the information superhighway increases, so do the incidents of computer-related crimes. Is your system at risk?

Only if your computer is set up with a two-way connection to the Internet, says Ted Beck, MIS manager for DeVilbiss Air Power Co., a manufacturing company in Jackson, Tennessee. "If you just log on to the Internet through a service provider, it's like walking into a shop, looking around and walking out. No one else on the 'Net can get into your system" Beck Explains.

However a computer system with a two-way Internet connection should be independent of the system that contains confidential information. If that's not possible, Beck advise, install "fire wall" software that crates a barricade which outsiders can't cross.

When programming your fire wall, Beck adds, make sure at least two people know the configuration. This prevents an employee from setting up a break in the wall that he or she may use later.

Contact Source

Devilbiss Air Power Co., 213 Industrial Dr., Jackson, TN 38301, (901) 423-7009;

Edition: May 2017

Get the Magazine

Limited-Time Offer: 1 Year Print + Digital Edition and 2 Gifts only $9.99
Subscribe Now
OK

This website uses cookies to allow us to see how our website and related online services are being used. By continuing to use this website, you consent to our cookie collection. More information about how we collect cookies is found here.