Monitoring Network Security Vulnerabilities

What is it?

Network servers have devices on them known as ports. Each port is set up to understand a certain type of language. There are ports, for instance, for database applications, website content, e-mail, instant messaging/chat, etc. They are similar to channels on television or a CB radio. Each port is either open or closed to the outside world, meaning it will "listen" to requests for that type of service. If a port is open, it is an opportunity for a hacker to attempt to access data or files on that server. Some ports need to be open, such as the port for web content on your Internet server. Others should not be (like the e-mail or database ports on the same server). Opening unnecessary ports can expose sensitive data and systems to hackers.

What is the impact?

If hackers are able to access your network, the damage they can do is extensive. Depending on what parts of the server/network they reach, they could steal data, deface your website, or worse.

How does SiteLock protect me?

SiteLock checks each port (thousands) on your servers to make sure that only the appropriate ones are open for the type of server you are using (e-mail ports for e-mail servers, web ports for web servers, etc.). We'll notify you if anything looks out of the ordinary so you can correct the issue.

What can I do about it?

Close all unnecessary ports. Make sure your ports that are open are protected using strong security. Use a website scanning service that includes network scanning, such as SiteLock Premium or SMB. Our Expert Services team can also help you lock down your network to prevent attacks.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

SQL Injection - Database Vulnerability

What is it? SQL injection, is an extremely damaging attack in which hackers will attempt to...

Preventing Cross-Site Scripting (XSS)

What is it? Cross-Site Scripting, or XSS, is a type of attack used by hackers to control the...

Reputation Monitoring

What is it? SiteLock's patent-pending 360-degree scan helps you make sure your website and...

Virus Scanning (Drive-by Downloads)

What is it? If your site has been compromised by hackers, they may be using your website to...

Application Scanning

What is it? Application scanning will verify the applications you've installed on your website...