We read daily about the hackers' activities and about hacking, loopholes and espionage campaigns around the world, whether governmental or private, to the extent that you feel that this world will explode at any moment! This makes IT officials anywhere in their account add proactive processes such as checking networks regularly and continuously to ensure that there are no risks or threats facing them. The main screening process consists of five core points and will be as follows

Dealing with default passwords

Indeed, it is strange that managers do not deal with virtual passwords. In many cases, we see breakthroughs for major companies caused by non-changing the default password on a machine. This makes hackers easily reach some unauthorized areas.

Check the services running on the operating systems

A problem with Microsoft operating systems in particular is the existence of some service that works by default even though the user does not need it, which can cause a lot of security problems later

Remote access control

At this point I will not only talk about Telnet, SSH, RDP protocols, but even programs that work the same way and use other protocols such as GoToMyPC, LogMeIn, PCAnywhere, TeamViewer, WebEx, Splashtop Remote, Screenconnnect, RealVNC, Mikogo, Ericom Blaze, AetherPal Bomgar, Programs that provide remote access, but such programs are always closed and ban the protocols that use them in an attempt to reduce the risks to the network

Check the portals

Port testing is one of the processes we do to identify systems that work in the network in an attempt to find out if the firrol is activated or not. Is a computer targeted by someone? Of course, there are a lot of tools and programs specialized in this kind of testing such as: NMB, Foundstone Vision, Portscan 2000, Incloak, Superscan, Angry IP Scanner, Unicornscan. There are also sites like Zebulon, Confickerworkinggroup, T1shopper, ShieldsUp

Evaluate the impact of weaknesses

There are a lot of tools that are used to check the weaknesses in databases (for example) and even with different systems and programs to verify anything that can be a threat to the network, but the network administrator must always be aware of the latest updates and technical developments because it is possible The databases or systems in his company are secure and there are gaps from some programs such as Java or browsers or even from flash and so on