There are many threats that could be attacking your network. Here are just a few that most clients have happen to them.OverconfidenceUser overconfidence in security products is the top threat to your network.Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords.Surveys promising free stuff result in theft of information like your mother’s maiden name, high school, etc. which can be used to answer common security questions.To avoid theft of otherwise secure data, think before you click.Social Networking SitesSocial networking sites like Facebook are exploding in popularity. Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable; defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies.We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.Attacks On Mobile DevicesEveryone is going mobile these days, not just the “road warriors.”Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen.Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.Cloud Computing“The Cloud,” in its simplest form, involves using the Internet to access and store your data.It’s actually thousands of servers all working together to provide computing power. When you access e-mail using a web browser, you are working in “the cloud.” Using the cloud for automated off-site backup is rapidly gaining popularity, but that’s just the beginning.Companies like Microsoft, IBM, and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet.You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.Pay close attention to this top threats and it will help with network security.