What hackers don’t want you to know - Business IT Plus Ltd

Cyber Security and the war against hackers

We had a fantastic day at The Future of Cyber Security conference yesterday.  It was all we expected and more.  The interview with Edward Snowden was a great end to the day (more of that in another blog).  There was so much information that it will take several posts to tell you all about it.  So here are the important bits:

  1. The weakest point of any computer system is the human being using it. You might have firewalls and anti-virus software, that prevent direct attacks on your network, but the people using the system can be tricked into opening emails or other applications that may contain hidden attacks.
  2. Hackers will exploit any weakness, including unlikely connections to networks or phones. One example was a company that was hacked via an internet connected fish tank monitoring device!  Hackers have even breached security via video conferencing units, fingerprint scanners and other devices.
  3. The methods of attack are changing. Sophisticated hackers can hide the fact that their link in a phishing email is not to your bank but to a completely different site where they can capture your password and other details.
  4. Hackers no longer need to be technical whiz kids. Templates for hacking are being bought by criminals with little or no technical experience.
  5. Mobile phones and tablets are not necessarily protected by the business network. In addition, more people are working away from the office.  This makes businesses more vulnerable to attack
  6. There is a lack of people skilled in cyber security

So how do you protect your system?

The good news is that there are ways to reduce the risk of security breaches

  1. Be aware of threats to your system from people leaving the company, disgruntled employees, spies for competitors or careless employees. Educate your users in keeping safe online – e.g. don’t click on links in emails without thoroughly checking the source.
  2. Install cyber security software, such as SonicWall* to detect and prevent attacks.
  3. Keep all software up to date as this often fixes known weaknesses in frequently used office or database applications
  4. Have a thorough company policy that covers the use of mobile phones and tablets for work. Make sure this includes unapproved usage of the system, such as watching porn or having personal apps (like Dropbox) on company mobiles.
  5. Make sure your systems are backed up frequently
  6. Know what data you’ve got, who uses it and how they use it. This helps to identify any unusual events or trends, so you can trace the source of any leaks or attacks.

*Business IT Plus recommends SonicWall to protect customer data and provide comprehensive network security.  This includes network firewalls, VPNs (Virtual Private Networks) and anti-spam for email.For more information, get in touch with us and we’ll happily come and have an informal chat about what your business might need over a cup of coffee.

Source:
Cyber Security Conference, 29th November 2018