Re: your network drive - as long as your hardware firewall has NAT (network address translation) enabled and you've not enabled any pass throughs you should be insulated from any inbound connections.
Of course if one of your local PCs gets infected, the network drive could be subject to attack since both the malware and the drive are "inside" the hardware firewall.
Also, if you have wireless networking enabled at your site, you've got a different potential attack vector available. You better at least have WEP enabled - although recognize that it typically takes me only about 10-20 minutes to crack a short WEP key and generally less than 2 hours to break a long one. But in general, you should still be OK from the typical neighborhood punk hacker wannabe if you use the longest key your hardware/software supports (or use one of the alternatives to WEP).
Also, (if it's a wireless router) make sure you've changed the router's administrative login to something other than the typical factory default.
Of course if one of your local PCs gets infected, the network drive could be subject to attack since both the malware and the drive are "inside" the hardware firewall.
Also, if you have wireless networking enabled at your site, you've got a different potential attack vector available. You better at least have WEP enabled - although recognize that it typically takes me only about 10-20 minutes to crack a short WEP key and generally less than 2 hours to break a long one. But in general, you should still be OK from the typical neighborhood punk hacker wannabe if you use the longest key your hardware/software supports (or use one of the alternatives to WEP).
Also, (if it's a wireless router) make sure you've changed the router's administrative login to something other than the typical factory default.

