[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Implications of banning countries ip

Posted on 2011-09-23
3
Medium Priority
?
269 Views
Last Modified: 2012-05-12
We have had several attempts on our server from a couple of countries in particularly.  I have banned the specific IPs.  But I prefer the idea of prevention

As we don't do business outside our own country, I am wondering if it is easier to ban all countries except our own for now.

I would appreciate any advice from any security experts on this.  Especially interested if there are implications, that I have not yet considered, if I do this
0
Comment
Question by:debbieau1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 84

Accepted Solution

by:
Dave Baldwin earned 2000 total points
ID: 36590938
Though what you're doing is not a bad idea and may make it more difficult, anyone who wants access can use a proxy server in this country to visit you.  You won't be able to tell where they came from.
0
 
LVL 1

Author Comment

by:debbieau1
ID: 36590995
Yes I understand that and thanks.  

I realise if someone is determined then it won't necessarily help.  I don't believe we have been specifically targetted, we are just more in the general path.  It's more someone just trying to get in where they can.   They haven't as yet, but I like to put up prevention where I can.

Thanks again for your input.

0
 
LVL 84

Expert Comment

by:Dave Baldwin
ID: 36591258
You're welcome.  Yes, they're trying to break in just about everywhere.  You become a serious target if you have money or secrets, then they try harder.  Thanks for the points.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question