Yes. Execulink Telecom’s network is designed to prevent unauthorized access. In addition Execulink’s email service also comes with free SpamGuard and VirusGuard protection to scan all inbound emails sent to an Execulink email account. Despite all of the measures taken to secure our network and protect your connection, your computer still needs anti-virus protection, a basic firewall or router, and protection against malware.
Firewalls are security programs that block unauthorized access and allow authorized access to your computer or computer network. Firewall software can be a program on your computer or be functionality built into a device such as a router. Firewalls use ‘rules’ to decide what kind of network activity is allowed, if a type of connection comes in which doesn’t match the established rules the connection is blocked. Since Windows XP all versions of Windows have come with limited firewall programs, in addition there are firewall programs that can be purchased (for example Zone Alarm, McAfee Internet Security and others).
Although the Execulink network is secure from outside intrusion the computer systems on your network may not be. Operating system exploits or misconfigured/out of date applications may leave you exposed to 3rd party access over the internet. If your operating system does not include firewall functionality you may wish to purchase firewall software for added security.
Given enough encrypted data, time, and computing power, attackers can compromise almost any cryptographic system. You can prevent such attackers from succeeding by making the task of cracking the password as difficult as possible. Two key strategies to accomplish this are to require customers to set strong passwords and to change your passwords periodically.
Our MyExeculink is configured to verify passwords are secure against dictionary and brute force attacks when being added or changed. When creating or changing a password, the system will check for the following:
One can easily create a secure password by substituting common letters for numbers to comply with these guidelines. For example:
All these examples meet length requirement (6-8 characters) and they have multiple characters as well as letters and numbers. Due to letters being replaced by numbers these passwords no longer contain whole words found in the dictionary (dictionary attacks are typically how passwords are broken).