The internet of bad guys; Cryptolockers and other attacks
If you have not been attacked by a Cryptolocker or otherwise hacked that's very good news!
Prevention is better than cure and we can provide technology to reduce the likelihood and impact of a future attack.
On the other hand, if you are under attack or recovering from one, that's not so good. Stop reading this and call us because time is critical.
The common security holes that hackers exploit
1. Weak passwords
Computers can crack passwords really fast. Using an easily guessed password just makes this easier. Always change the default password for any service you use and pick a strong password of more than 8 characters that include upper and lower case, numbers and special characters. Do not use the same password for multiple systems because a breach of one then allows access to all others.
2. Out of date virus protection, or non at all
Computer viruses are everywhere. If you don't have up to date virus protection on all devices you're an easy target. Common places to pick up a virus are through websites, thumbdrives and email attachments. You're only ever 1 click away from a computer virus so continually updated virus protection is a must have.
3. Social engineering and scams
It's not just your technology that needs to protect against the bad guys. Your people do too. If you think phishing, whaling and spear phishing sound like recreational activity these are all techniques hackers use to get your staff to disclose useful information to gain access to your systems. Awareness of the techniques and constant vigilance are necessary to keep up with ever increasing sophistication of scams.
4. Poor system security
Hackers don't just get into your system through the front door. They are brilliant at finding back doors to gain entry undetected. Imagine if your server was under attack by 'crawlers' looking for back doors on a daily basis; would that crawl find unsecure data, admin functions, remote access sessions to hijack? The likelihood of your cloud servers being crawled for back doors is very high. The probability of back doors being found ties back to vigilance in understanding who is doing what in your cloud environments.
5. The inside job
Would you believe that roughly 22% of all data breaches are the result of deliberate theft by employees? Not your employees of course, they wouldn't do that to you would they? The stark reality is that data theft is probably happening right now, right under your nose if you are not actively looking for and preventing it. Your customer data, employee data, and intellectual property are valuable assets to you and it's highly likely that this information is leaking out via your current (and potentially prior) employees.