Dura-Tech joins together with LeadingIT Learn more
Our knowledgeable team will support you organization, allowing your staff to get the most out of your technology.
We implement layers of protection to ensure your organization is secure.
Using best practices, we proactively protect your organization from becoming a victim of cybercrime.
As a Datto Blue Diamond Partner we secure your data with industry leading backup and disaster recovery solutions.
LeadingIT understands the technology needs of your business and offers computer, network and cybersecurity support to help you get the most out of your technology.
Read why businesses small and large across Wisconsin, Illinois and Indiana choose LeadingIT.
Working at LeadingIT means joining a group of people obsessed with taking on the real challenge of cybersecurity and helping businesses.
Stay up to date on the latest security threats your business faces and get tips on how to stay protected and informed.
To reduce cyber risk, it’s important to invest in a combination of people, process, and technology to stay a step ahead of the bad guys.
The majority of hackers surveyed in the 2018 “Black Report” claimed they could breach a perimeter and exfiltrate data in less than a day. The results were similar across industries, from telecommunications companies to law firms, federal government, critical infrastructure, and aviation.
Cyber defense can seem like a constant game of whack-a-mole, with security teams trying to keep pace with increasingly sophisticated hackers and other cyber criminals. And everyone is at risk, says Jeff Moss, founder of the Black Hat and Def Con security conferences and a security advisor to the secretary of Homeland Security.
“They’re all at risk, they’re being attacked continually, and they’re all vulnerable,” Moss explains. “I don’t think the news is that Fortune 500 companies are vulnerable. The news is, what are they doing about it and how do they control their risks? “No company can be 100 percent secure.”
While many malicious hackers will go for low-hanging fruit with simple phishing techniques, others are much more creative. Last year a casino was victim to a breach from a seemingly innocuous source: a connected fish tank. Its sensors were connected to a PC that regulated the tank’s temperature and cleanliness, and after breaching the tank sensors, the attacker moved around the network and stole 10 gigabytes of data.
Separately, British consumer rights group Which? cautioned it was disturbingly easy to hack into connected toys like Furbies– echoing a warning from the FBI.
While there might not be any Furbies in your enterprise, the warnings illustrate the inventive methods hackers can use.
Jennifer Arcuri, co-founder of white-hat consultancy Hacker House, says some of the first actions her firm takes when exploring vulnerabilities for a client are to figure out who might be targeting a business and who the adversaries are.
“Then we look at what vulnerabilities are there,” she says. “By design, all computers are broken.”
Moss agrees. “The internet is full of robots, and they’re checking everybody,” he says. “You need to be prepared to just assume that you’re always under attack, not because you’ve been singled out, just because you’re participating.”
The Hacker’s Perspective
When security teams adopt a hacker mindset, they can develop a more holistic defense strategy that combines people, process, and technology.
“Hackers are very persistent and data driven,” says Arcuri. “Always anticipating how that might be applied to your organization is a good way to think about it from their point of view.”
There’s a lot that industry and law enforcement can learn from the hacker community, says Arcuri. “The information sharing and transparency, understanding how things work, so much of that can be harnessed into better solutions,” says Arcuri.
What are you doing for cybersecurity? Do you have a plan in place if a hacker retrieves your data? Is your business prepared? Call us today for a free tech review!
some content recycled from cio.com
©2022 LeadingIT. All Rights Reserved.