Have you ever found yourself wondering what the person next to you is doing on their computer, PDA or other electronic device? Maybe they are just reading their e-mail. – But they could be reading yours while you innocently sip your latte. To make matters worse—yes it could get worse— they could be listening in on your private conversations, via a hack deployed to your mobile telephone.
Have you ever really thought about who is protecting your intellectual property in the electronic world? -- I’ll bet you are thinking about it now. What have you done recently to protect your assets? Whether it’s your private property or your company’s asset, security is something that should never be taken lightly.
Like many of you reading this blog, I, too, sometimes peruse my email or adjust code on my latest development work while enjoying a cup of java at my local coffee shop. Recently, while doing just that, I noticed an open, unencumbered wireless network. Upon further inspection, I found that it was a wireless router belonging to an employee from a large enterprise company, who was sitting at the table next to mine. His router was attached to his company’s corporate network. My first thought? – “Now that gives a whole new meaning to ‘window shopping’!”
Even with the proliferation of security awareness, I fear that this happens more often than anyone would like to admit. I imagine that my coffee shop neighbor intended no malice. However, his actions provided a “Trojan horse” into the company’s network– and that could one day prove tobe catastrophic. After this incident, I went to his company and asked to speak to security personnel to make them aware of what was happening.I also suggested companywide training on security and risk associated with technology applications and devices, and appropriate use of same in public venues.
So let me ask you: How secure is your corporate network? I’m sure, like most customers, you have a very strong sense of security with your corporate IT infrastructure. Do you measure the number of brute force attempts on your network? What about the security practices used by your employees on a daily basis such as Post-it notes for passwords or e-mailing one’s own password to a personal e-mail account that’s unsecure. Or, as previously mentioned, placing your wireless router on your desk to allow your latest gadgets access to the internet. – Those things all seem harmless. Right?
Intrusion prevention is usually under-estimated – discussed with Dr. Larry Ponemon in the latest issue of Connect Converge – as most IT security-conscious shops focus primarily on external threats; yet, denial of service is usually over looked. You should also be aware, that internal threats have risen slightly with the turn in the economy.
Are you prepared to navigate through security do’s and don’ts? What are your needs vs. desires for secure mobile or remote connections? Here is another mode of attack that you should be aware of. -- One of the latest trends in Cyber Security is the act of “phishing” via a technique known as “evil twin” –I know what you’re thinking… Chris!!! LOL. In this method of attack, you see and use a wi-fi access point that appears to be legitimate. – But wait. – It’s a rogue access point and a hacker is surfing your computer while you browse the internet! For example, when you travel, how secure is the wi-fi network you jump on while having a cocktail, waiting for your boarding call? This is just one more thing to be aware of as you sail through the sometimes treacherous I.T. sea that is called electronic security.
HP Security professionals can help you and your company take action to prevent any unwanted access. HP TippingPoint Intrusion Prevention System is just one of many software suites that will provide you with the right level of awareness and protection on both internal and external security factors. Go to HP Enterprise Security and review the HP Security Portfolio to see which key areas you need to focus on. Rest assured that Hewlett Packard and our partners –Symantic, McAfee and others-- take your security very seriously.
And - saving the best for last – You can let your imagination run wild with Cybergeddon, a new Anthony Zuiker e-movie experience all about – you guessed it -- cyberattacks. Yes, it may be a little far-fetched in its grand scale, but the security risks such as brute force, worms, etc., mentioned in this movie are real and should remind you that it is in your best interest to have a security professional integrate your infrastructure.
Thanks to Yahoo Originals (keep up the good work Marissa Mayer!) for making this film possible, Symantec for giving everyone a peak into the world of cybercrime, & my HP family for providing the HP Envy Spectre Ultrabooks, HP Touchscreens All-in-Ones and Large Displays in the Cybercrime Operations Center. Awesome film.
I‘d also like to invite you to take a few minutes to watch my video blog – YouTube. In it, I share some insight and brief examples of brute force attacks, and other important security concerns. Like what you see/read? Follow Chris and me on Facebook and Twitter. – We are always anxious to share our ideas about technology advances – and what you need to be aware of. – AND - Stay tuned for more cool videos in our series “Blog About I.T.”
Get solutions from the Experts. See what else they can do for your Business here.