10 Wild IT Security Tricks That Actually Work



#4. Using nondefault ports:

It’s a fact that organizations know that they can at most minimize security risks if they had installed services on nondefault ports. But still IT companies tend to repeat the same mistake over and over again. Yet the fact can’t be denied that hackers deploy worms, viruses or even does a remote buffer overflow through these default ports. Best example to quote along with this topic is the recent exploits suffered by Symantec’s pcAnywhere and Microsoft‘s Remote Desktop Protocol. After the hacks, defenders tried applying patches, blocking the ports before the worms could arrive. Security analysts say that such an incident can easily be cleared, if they had changed their ports to any of the nondefault ports. Analysts also ensure that it’s easy for the hackers to take note of the default ports with good apps like Nmap and Nikito that has the ability to identify the port with its port scanning technique.