Intrusion Protection

Video Blog from DC the Computer Guy

Every day millions of computers are falling victim to new and advanced threats. The more serious of these are called Intrusions – in terms of computing, this is the act of compromising a computer system by breaking through its security. Unfortunately, the recent Solar Winds hack has provided cybercriminals with the access they need to successfully compromise networks by infecting the very tools used to keep them secure.

But these aren’t the only tools available.

With an Intrusion Prevention System (IPS), small businesses can help to protect themselves from a variety of threats, and more importantly, detect and prevent intrusions to secure critical data and information systems.

Although the Solar Winds hack has been in the media a lot recently, there hasn’t been enough discussion on the Intrusion threat and how to defend against it, which is why I thought it would be a timely topic for my video blog. Click on the video below to watch.

The goal for us here at CLARK is to detect and prevent unwanted traffic on networks and devices. While security tools, such as antivirus programs are readily available to protect computer systems, their capabilities are limited when it comes to preventing unauthorized access.

Fortunately, there are a number of intrusion tools that have been created to track, monitor, comprehend, and detect unwanted traffic on a network or networking device. Because so many businesses are in danger of losing money or having private and confidential information exposed, network security has become important for all sizes of business. While I go into using Intrusion Prevention Systems more in this video blog, I wanted to highlight some aspects of it for you here.

Intrusion Detection System

The IDS is responsible for monitoring all of the data traffic inside a network, looking for malicious activities and policy violations. Intrusion activity or violations are collected centrally, with alerts sent to administrators, combining outputs from multiple sources to distinguish malicious activity from false alarms. These range in scope from single computers to large networks, with solutions available for any size business.

Intrusion Protection System

An IPS not only detects an attack, it takes the preventive action of responding to the attack, such as closing access points and configuring firewalls to prevent future attacks. In addition, they can be used to identify issues with security policies and internal challenges to them, deterring employees and network guests from violating the policy rules.

No Performance Degradation

Both the IDS and IPS can be divided into two main categories. A Host Intrusion Prevention System (HIPS) monitors and evaluates the traffic before it reaches the network, while a Network Intrusion Prevention System (NIPS) monitors and evaluates packets before they enter the computer. Regardless of which is used, all traffic must pass through them before being allowed in, thus the process doesn’t affect performance.

Cybercriminals are clever, which is why we so often hear that it takes weeks or months to even detect a hack. With these threats out there, all small businesses should incorporate an Intrusion Prevention System into their network immediately. Please note, this is not a DIY project, properly setting up and configuring an IPS takes time and experience, so be sure to reach out to your IT provider to get the process started.

If you don’t have an IT Provider and have further questions, fill out the form below or give us a call for more information.


    For internal use only,
    we never sell or distribute email addresses.


    5 1 vote
    Article Rating
    Notify of
    1 Comment
    Newest Most Voted
    Inline Feedbacks
    View all comments