Like us on Facebook

How network assessment technology works

We use a product called the Network Detective from RapidFireTools.com to run our network assessments. This is a highly specialized diagnostic tool designed specifically to allow IT service providers like me to perform a comprehensive scan of my clients’ networks in usually just 10-20 minutes.

After the scan is complete, I can run an analysis of the findings and quickly identify a wide range of network configuration issues and security holes that can easily go unnoticed. Read the rest of this entry »

Six steps to gain peace-of-mind about your computer network

I’ve written few blog posts about my passion for the need for everyone to conduct regular network assessments. With all my years in the business, I’ve seen more than my fair share of unhappy people whose lives were turned upside-down by a network failure or compromise that never should have happened.

I understand if you’re skeptical. I would be too if I didn’t run into scary situations whenever I run one of our quick and easy network assessments. Here are eight common problems I typically find: Read the rest of this entry »

The top 7 “unmonitored” network configurations to watch

Even if you have so-called Remote Monitoring and Management (RMM) agents running on your network, that doesn’t guarantee that you’re getting visibility into all of the most important security and configuration items that need to be regularly checked.

I remember a case of a Texas man who illegally accessed his former employer’s computer database and deleting some important files. He had been an employee of a services provider to the domestic natural gas and oil exploration and production industry. Read the rest of this entry »

Have you been given a clean IT Bill of Health?

What do I mean by that? I mean, that nobody has access to files, folders, and data who shouldn’t. Devices that you’ve decommissioned can no longer access your network. No new devices are currently connected to the network that you don’t know about. Everyone is using strong passwords to protect network access. Permissions for active users are in alignment with your security policies. You don’t have ports open to the internet for potential external penetration. Etc., etc., etc. You get the point. Read the rest of this entry »

All it takes is one missed detail to wreak havoc on your network

One missed user. One open port. One wrong security setting. There are a thousand details driving your complex computer network, and it only takes one small setting to create one big security or maintenance problem.

Anyone who has been responsible for maintaining a computer network knows what I’m talking about. But if you’re not a computer or network expert, and have been fortunate enough not to have personally experienced a computer disaster, consider yourself fortunate. Read the rest of this entry »