ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? i-medIT can help. To learn more, reach out to us at 630-549-6199.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Google Hackers Cloud Backup Microsoft Innovation Android Small Business Email Network Security Internet Hardware Software Business Cybercrime Ransomware Efficiency Malware Data Smartphones Cybersecurity Cloud Computing How To VoIP Smartphone Computers Windows Data Backup Mobile Devices User Tips Browser Managed IT Services Social Engineering Mobile Device Management Productivity Business Management Chrome Business Continuity Server Network Automation Money Disaster Recovery Windows 10 Safety Two-factor Authentication Bring Your Own Device Law Enforcement Gadgets Outsourced IT Data Protection Alert Collaboration Managed IT Services Upgrade Phishing Bandwidth Data Recovery Spam Data Breach Telephone Systems Communication Internet of Things Computer Data Security Vulnerability Operating System Tech Term Social Media App Word Internet Exlporer Data Storage Data storage Router Government Identity Theft Save Money Passwords IT Management IT Services OneNote Gmail IT Plan The Internet of Things Productivity Virtualization Unsupported Software Miscellaneous Redundancy Avoiding Downtime Hosted Solutions Comparison Spam Blocking Artificial Intelligence Physical Security BYOD Remote Monitoring Private Cloud Google Drive Business Intelligence Cleaning Update Wi-Fi Downtime Public Cloud Windows 10 CES Apps Communications Recovery Office 365 VPN Quick Tips Saving Money BDR Password Netflix Relocation Inventory Remote Work Tip of the week Employer-Employee Relationship FENG Current Events HIPAA Voice over Internet Protocol Windows Server 2008 IT Support Access Control DDoS Workers Managed IT User Error Knowledge Human Resources Outlook Windows 7 HaaS Authentication Credit Cards Infrastructure Botnet Network Congestion YouTube Reputation Staff Multi-Factor Security Humor Flash Settings Apple Fraud Holiday Password Manager Travel End of Support IT Consultant Customer Trending Flexibility iPhone Amazon Big Data Business Mangement Root Cause Analysis Internet exploMicrosoft Marketing Hacking Electronic Medical Records Digital Signature Software Tips Monitor Sync Going Green Managed Service Provider Charger Uninterrupted Power Supply Amazon Web Services Recycling Black Market Advertising webinar NarrowBand Encryption Data Management Specifications Automobile Legal Windows 10s Computer Care Office Tips Online Shopping eWaste Meetings Networking Conferencing Wireless Technology Hiring/Firing Accountants Work/Life Balance Keyboard Telephony Health Samsung Evernote Patch Management Criminal IBM Sports Facebook Emails Millennials Microsoft Office HBO Skype Mobile Device Solid State Drive Value Tech Support Wireless Charging Scam Data loss Robot Hybrid Cloud Supercomputer Practices Workforce Frequently Asked Questions Start Menu Audit Laptop Files Shadow IT Cortana Content Management Google Docs Screen Mirroring PDF Budget Chromecast Office Hosted Computing Telecommuting Excel Tools Computer Fan Touchpad History Google Apps Blockchain Website Cast Content Workplace Tips Firewall Computing Infrastructure Techology Worker Audiobook Wearable Technology Thank You Instant Messaging Assessment Smart Technology Applications Rootkit Entertainment USB Congratulations Television Two Factor Authentication Users Wireless IT Support Training Nanotechnology Troubleshooting CrashOverride Public Computer Virtual Reality Vendor Management Smart Tech Worker Commute Risk Management Mobility Connectivity Books Search Save Time Politics Devices Emergency How to Best Practice Thought Leadership Employer Employee Relationship Experience WiFi Webinar Computer Accessories Music Video Games Loyalty Transportation Battery IT solutions Bluetooth Scalability SaaS Remote Computing Benefits Education Information Technology