Security Basics 

Now more than ever, knowledge is power when it comes to security. The following pages are an introduction to the risks and rewards presented by online business operations, and the basics of how to protect networks, servers and desktops from attack or misuse.

Examples of: Fraud and Extortion, Denial-of-Service Attacks, Sabotage and Business Interruptions, Viruses, Personal Injury/Privacy, Privacy Violations--Unauthorized Access to Customer Information, Intellectual Property Infringement, Negligent Security, Online Trespass, Product Scenarios, Unauthorized Access, Hacking/Breach of Network Security and Extortion

What Is At Risk?

What Is A Threat?

What Is Protection?


What Is The Answer?

Commonly probe ports

Trojan Horse FAQ

Gramm Leach Bliley Act - GLBA Compliance PDF

Health Insurance Portability and Accountability Act - HIPAA

Insurance