Skip to main content

How can I do a basic check of my internet security at my home or office?

I worry about internet security for my home office or business what do I do?

This isn't meant to be an all inclusive guide to perimeter or firewall security, but if you worry about the security of your home, home office, or small business internet. Here's a great tip to use your cellphone as an infosec tool to assess the security of your perimeter. So let's dive right in:

  1. From a computer on the network you'd like to test go to whatismyip.com 
  2. Take note of the IPV4 address, this what we call your real world IP address we're going to need it in the next step.
  3. Download Fing from the android or iOS app store. 
  4. Open Fing Click Tools at the bottom then click "Find open ports" Input the IP you got from step 2. 
  5. Before you click scan make sure to turn the Wi-Fi off on your device, you want to simulate an external scan of your network, and your cellphone disconnected from Wi-Fi does a good enough job of representing that for a quick and dirty test like this. 
  6. The results will identify different ports and services, sometimes with a short description or explanation of what the service related to the part does. Here are just a few to watch out for especially if you don't have a reason for these services to be available outside of your home or office but if you do I would maybe reconsider using a VPN to access these services:
    1. 80, 8080, 443: Usually used for web based control panels for routers and other networking and inter-faceless equipment. 
    2. 3389, 5900: Remote desktop ports for Windows and VNC (Mac/Linux/Windows)
    3. 137, 138, 139, 445: These ports are found in Windows Networking and File Sharing
    4. 548: Apple Filesharing Protocol 
    5. 22: SSH used to remote manage and control computers. 
    6. If you find a port that I didn't list google: what does x port do? to find your answer.
  7. Careful I just taught you how to port scan so now you have to promise to only do it to things you own or you could get in serious trouble. 

Comments

Popular posts from this blog

Why traditional Pen Testing is dead.

Annual, bi-annual, and quarterly penetration testing schedules will be a thing of the past.  The advent of sophisticated cyber threats has necessitated a paradigm shift in vulnerability management. In this transformative digital era, the static, once-a-year model of traditional penetration testing is becoming increasingly obsolete. Instead, it's time for businesses to embrace a dynamic model of continual vulnerability detection and mitigation - Penetration Testing as a Service (PTaaS) by Xcape, Inc. This innovative service combines the precision of automated remote pen testing with the strategic oversight of seasoned penetration testers, creating a comprehensive solution for the latest cybersecurity concerns. The Case for Internal and External Network Testing In a conventional cybersecurity setup, the focus is often on safeguarding the external network, the so-called perimeter. However, this perimeter-centric approach, while essential, is not sufficient in today's threat land

How secure is your SMB's domain name?

Studies show that small businesses are being targeted now more than ever in cyber attacks. ( Forbes: Small Businesses Are More Frequent Targets Of Cyberattacks Than Larger Companies ) When cybersecurity professionals discuss two-factor authentication, domain registrars or DNS hijacking is often not the topic. (Think 2FA for GoDaddy , NameCheap , and SquareSpace , to name a few. Take a moment and use these links to setup 2fa for your domain, or google "How to turn on 2fa for name of provider .") Surprisingly, even in 2023, some providers still don't support this essential security control.  However, your domain name controls an organization's corporate website and email exchange records. And suppose an attacker were to get control of it. In that case, they could recreate your email addresses, and password reset their way to control all the accounts owned by an organization.  A few of the recent incidents we've responded to involve attacks where the attacker obtains

Ensuring Cyber Insurance Coverage: The Crucial Role of Security Controls

In today's digital landscape, many business owners believe that obtaining a cyber insurance policy automatically guarantees protection. However, this assumption is far from reality. Even with general liability policies that cover cyber claims, organizations must meet specific minimum requirements to ensure their claims are approved. In fact, some insurance carriers may collaborate with cybersecurity partners to evaluate the implementation of security controls before determining coverage applicability. Xcape, Inc.  can offer the guidance and expertise to ensure these security controls are implemented to strengthen your overall security posture. In addition, our Managed IT Provider Services implementation of the following security controls gives organizations quicker recovery in the event of a security incident so that our customers can get back to work in minutes and hours vs. days and weeks.  Although often overlooked by insurance providers, your policy documents clearly outline th