Security on a network is a two way street
Security on a network is a two way street. It does not matter if it is your personal or business network. There needs to be as much thought about things coming into the system and things going out of the system.
When was the last time you considered what was going out on your network. Things going out can compromise your network? You receive emails and then send them onto others. You access websites and interact with these websites. As well you might be one that does online gaming.
Even if there is a firewall in place. Once you access the internet you are vulnerable to what is roaming out there on the internet.
I remember reading an article. It stated that stated that religious and regular sites are more vulnerable. That is to have viruses and malware on them than paid XXX sites.
I remember a few years ago my brother-in-law came to me with a question. The question pertained to the fact that he wanted more control over certain computer. He wanted to be able to control the web sites on that computer. It had nothing to do with accessibility to unwanted sites. This had to do with the ability to prohibit access to websites at certain times during the day.
How to Restrict Internet Access
Now there are two ways to prohibit access to websites through one’s network. One is through the home router. The other is through each individual computer on one’s network. Now this needs understanding through the technology. That is how devices able to access the internet. This could be a smartphone, iPad, tablet, laptop, or computer.
You are also limited the access times of day to the internet. The times of day will depend on who it is. You might have young children, school age children or even high school. There might also be college age young people in your home.
How much control that you what to have will depend on the above mentioned situations.
Why You would Restrict Internet Access
Getting back to my brother-in-law. They had a daughter that was home schooling at home. When she would use the internet for school work it was too easy to access other sites. These sites included sites like Facebook, twitter and YouTube. What was happening was that she was getting lost in these sites and not completing her school work.
They did not want these sites band from everyone else their daughter. They needed her to access the internet for school purposes but not to waste time on.
Here is an example that one computer needed restricted accessibility in the home. The rest of the computers and Internet of Things (IoT) did not need this control.
Now I have had an issue in the past that is different. In our home we needed to prohibit all xRated sites so that our son would not access them. Thus we needed to band such sites from the whole network.
How to Restrict Internet Access
Whether you need to restrict one computer or need to restrict a whole network you are able to do that. You are able to restrict one computer with the file called hosts. You can access this file in c:\Windows\System32\Drivers\etc\hosts. If you need to restrict a network you can do it through the parental controls of your router.
This information might seem very technical to you the reader. I have to agree. You do need to know some information on how to get around your computer. Also you need to know how to get around your router. Once you understand. Then this information and knowledge will help you control any computer and router. Then you should be fine.
Steps to Restrict one Computer to The Internet
To restrict one computer you need to do the following steps:
- Press the Windows key.
- Type Notepad in the search field.
- In the search results, right-click Notepad and select Run as administrator.
- From Notepad, open the following file: c:\Windows\System32\Drivers\etc\hosts.
- Make the necessary changes to the file.
- Go to the bottom of the file.
- At the bottom you will find 127.0.0.1.
- Add the next line – 127.0.0.1 www.yoursite.com .
- Click File > Save to save your changes.
These steps will restrict this computer or any computer to accessing the website. All other computer and IoT will still be able to this website or any number of websites in the list in the hosts file.
Steps to Restrict a Whole Network to The Internet
To restrict a whole network you need to do the following step:
- Open your favorite browser.
- Type in your router’s ip address.
- It is usually 192.168.0.1.
- Type in the username and password to access your router’s web interface.
- Access the parental controls.
- You can filter a device, a keyword, a day and or time of day.
- Save your changes in the router’s web interface.
- Log out of your router’s web interface.
The above steps will aid you in restricting your network for any reason. This includes restricts for any device with keywords and day and time for one or all devices on the network.
Reason Why Security is Important
Now you can see that security is as important from the personal side as it is from the internet side. There are many web sites that will threaten your personal security.
These sites can mine your personal and business information without you knowing it. These sites can release malware and spyware to do this without you know that the mining is going on. Being aware of how much personal and business information you give out is important. When asked you need to know that there are websites out there that will do the same.
These websites are very well engineered. They will take you to another website without you know it. The website will look the same but are different.
You need to know about these websites. They are phishing websites. You need to be aware of how these websites work. They are subtle. Clicking on a link and then going to a similar website is all it takes. Many malicious websites will do the above mentioned action. So as a reader of this post you can now be aware of this situation.
Along with phishing now users of devices have to deal with ransomware viruses. If you do not already know from the name and news reports. Ransomware holds the computer or IoT device from ransom. There is always a dollar figure attached to the ransom. Because the thief that is able to ransom more thank one device at a time the ransom amount is or can be low.
Security Breaches Have Already Happened
Many organizations and companies already have had this experience. Ransomware threats are real. They are happening more and more all the time. This is one more way that cyberspace thieves are able to access people’s funds. The locked device becomes inaccessible until the thief receives the ransomed amount. These devices can be anything from your computer to your car.
It is true that ransomware is different from phishing or any other type of malware or virus. Controlling your network activity will definitely lessen unwanted issues. This is true for any of the above scenarios. This is as important as controlling access to personal or business data information. How important your data is will determine if it will be a target of any theft by any thief. Protecting your data should be a priority at all times.
It is so important to remember data security is the priority of the owner of the data. Therefore, stop, think, and then connect. It is through this process that the security of your data and information will be at the highest level. Do your part to control and protect your data and information at all times.