Network Security – The Real Vulnerabilities

Scenario: You work in a company surroundings tweet board in which you are, at least partially, chargeable for community protection. You have carried out a firewall, virus and spyware safety, and your computers are all updated with patches and security fixes. You sit down there and think about the cute process you’ve got completed to ensure that you’ll not be hacked.

Screen Monitoring Software for both Windows & Mac - Dokodemo Blog

You have finished, what maximum humans suppose, are the principal steps towards a steady network. This is partially correct. What about the other elements?

Have you idea approximately a social engineering attack? What approximately the users who use your network on a every day basis? Are you prepared in coping with attacks by way of those human beings?

Believe it or not, the weakest hyperlink on your protection plan is the people who use your network. For the maximum element, users are uneducated at the procedures to discover and neutralize a social engineering assault. What’s going to prevent a user from finding a CD or DVD within the lunch room and taking it to their computing device and starting the files? This disk could contain a spreadsheet or word processor report that has a malicious macro embedded in it. The subsequent issue you understand, your network is compromised.

This problem exists especially in an surroundings where a assist desk workforce reset passwords over the cellphone. There is not anything to forestall someone purpose on breaking into your network from calling the help table, pretending to be an worker, and asking to have a password reset. Most agencies use a gadget to generate usernames, so it isn’t very tough to parent them out.

Your enterprise need to have strict policies in area to verify the identity of a user before a password reset can be completed. One simple component to do is to have the person go to the assist table in individual. The different method, which works properly if your offices are geographically far away, is to designate one contact inside the workplace who can smartphone for a password reset. This way all people who works on the assist desk can apprehend the voice of this individual and understand that she or he is who they say they’re.

Why might an attacker visit your workplace or make a cellphone name to the help desk? Simple, it is usually the direction of least resistance. There is no need to spend hours trying to interrupt into an digital machine whilst the physical gadget is less difficult to exploit. The next time you spot a person walk via the door at the back of you, and do no longer understand them, prevent and ask who they’re and what they’re there for. If you do that, and it happens to be someone who isn’t imagined to be there, most of the time he’s going to get out as rapid as viable. If the individual is meant to be there then he’s going to most possibly be capable of produce the call of the person he is there to peer.

I understand you are saying that I am crazy, right? Well consider Kevin Mitnick. He is one of the most decorated hackers of all time. The US authorities notion he may want to whistle tones into a cellphone and release a nuclear attack. Most of his hacking changed into achieved via social engineering. Whether he did it thru bodily visits to places of work or by means of creating a smartphone call, he performed some of the finest hacks to date. If you need to realize extra approximately him Google his call or read the 2 books he has written.