Out of the Box Solutions Blog

The Right Analogy Makes Hacking Make More Sense

The Right Analogy Makes Hacking Make More Sense

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

Brute Force Attack
If a robber really wanted to get at the valuables you had in your house, they would get past your locked door by any means necessary--including breaking through a window, or kicking in the door if need be. This display of brute force is a straightforward, if inelegant, means of getting the robber into your house.

A hacker uses brute force in a similar fashion, but instead of using physical force, they will overwhelm a system through other means. Some will use specialized programs to generate random password after random password extremely quickly, overwhelming the target system. As such, this attack vector can be particularly potent.

Trojan Horse
You hear a knock at your door, and when you answer it, someone is there, holding their arm and wincing. They say their car is in a ditch and ask to use your phone. You say yes, bringing them to your phone, and don’t think of it again--until your house is robbed when you aren’t looking. Turns out, while you were leading them to the phone, this person swiped your wallet, a few other valuable trinkets, and a spare key so they could come back later. In short, they leveraged your trust and then betrayed it.

Named after the subterfuge horse the Greeks used to infiltrate the city of Troy, a computer Trojan Horse operates in a similar way, sneaking in a threat under the pretense of something else or while their target is distracted by some other threat. The Trojan will then steal information gradually, as to not cause alarm.

Security Exploits
The easiest door to get past is an unlocked door, so most burglars will likely look for an easy way to unlock it. Perhaps your front door has a window on it. It would be much easier for someone to break a window and unlock the door than it would be to break down the door entirely.

The window in the door could be considered a security exploit, a weakness that provides a way around the strong security that is in place. Possible exploits include mismanagement of sensitive data or problematic code. All it takes is a single vulnerability to open up your network to greater threats.

Two-Factor Authentication
What’s better than a lock to secure an entryway? That’s right, two locks. It’s even better if there are two types of locks. Two-factor authentication provides dual locks to gain access to your company’s network. By having a system in place that has you enter a set of credentials to unlock another set of credentials, you make it much more difficult for people who aren’t granted access to enter that entryway.

Social Engineering
Let’s say that you have a new neighbor that you get to know, and to you it has become a friendship. You ask these people to feed your pet, leaving instructions and the keys to your house. When you get home, the pet has destroyed your home and you have some items missing. Your “friend” robbed you.

Social engineering is the art of taking calculated approaches to data theft. Since getting in to a computing network is more difficult than having someone with access do it for you, victims of social engineering fall for a ruse, and end up letting people walk right out the “front door” with the items they planned to steal in the first place.

Do you need help securing your data? If they answer is yes, you need to come up with a plan. You can start by visiting our website and blog to get useful information about how to protect yourself and your data. For a more direct consultation, call our security professionals at 800-750-4OBS (4627).

Tip of the Week: Lost Internet? Don’t Lose Product...
How to Prevent Office Issues Between Workers of Di...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Privacy Productivity Internet Efficiency Cybersecurity Smartphones Browser Microsoft Android Communication Malware Hardware Mobile Device Ransomware Email Network Small Business IT Support Cloud Data Google Passwords Windows 10 Wi-Fi Mobile Devices Data recovery Internet of Things IT Services Communications Applications Wireless Holiday Users Backup Saving Money Business Management Collaboration Managed IT services Innovation Data Backup Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions VoIp Software Information Marketing Networking Business Hackers Outsourced IT Workplace Tips Social Media Managed IT Services Cloud Computing Cortana Compliance Virtualization VPN BDR Gmail Data Management Remote Monitoring and Management Computers Save Money Tech Terms Access Control Microsoft Office Automation Managed IT Service Connectivity Medical IT Remote Computing Smartphone Patch Management Facebook Artificial Intelligence Computer Apps Cost Management Analytics Bandwidth Virtual Assistant Password Managed Service Mobility Wireless Charging Environment Phishing Update Government PowerPoint Content Filtering GDPR Data Security Inventory Unified Communications Spam Websites Internet Explorer Comparison Training IT Management Touchscreen Spyware Cybercrime Telephony Proactive IT Help Desk Backup and Disaster Recovery Downloads User Tip WannaCry Server Management e-waste G Suite Data Breach Outlook Big Data Sports Data Protection RAM Workers Edge Virus Safety Threat Specifications Security Cameras Server Microsoft Office 365 HP Tactics Voice over IP Business Continuity Settings Hard Drives Trends HIPAA disposal Bring Your Own Device Sales Profitability Gadgets Storage Mobile Security Microsoft Teams Millennials Miscellaneous Antivirus Printing Reporting Word Document Management Telecommute Upgrade IT budget SSD A.I. Dark Web Hard Drive Value Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security Operating System Company Culture Business Technology Staff Dongle Paper Conferencing Wearables Lead Generation Network Attached Storage Movies Authentication Paperless Office Maintenance Analysis Certification Battery Error Processors Cables Excel BYOD eCommerce Laptop Technology Tips Managing Stress Troubleshooting Ink Office SaaS Healthcare Twitter Telecommuting Authorization Digital Data loss Router Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Office 365 Plug-In Wireless Internet Online Shopping Streaming Media Tip of the week Quick Tips Personal Information Disaster Recovery Regulation Alert Printers