Home   About Us   Services   Solutions   Support            
 
Power Protection
Data
Networking
Security
 
Overview
Importance of Security
Threats to Data
Who are the Enemies?
What can the Enemies do?
Services
Assessment
Audit
Penetration Test
Security Policies
Security Tools
Wireless
E-business
 

As with any type of crime, the threats to the privacy and integrity of data come from a very small minority of vandals. However a single hacker working from a basic computer can generate damage to a large number of computer networks that wreaks havoc around the world. Even employees, through mischief, malice, or mistake, often manage to damage their own data. Furthermore, with the recent pervasiveness of remote connectivity technologies, businesses are expanding to include larger numbers of telecommuters, branch offices, and business partners. These remote employees and partners pose the same threats as internal employees, as well as the risk of security breaches if their remote networking assets are not properly secured and monitored. Therefore, it is essential for the companies to understand who the potential enemies are.

 
 
© Copyright 2002 Eitech. All rights reserved.