Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Lessons Taken Right From the Hacker’s Playbook

Security Lessons Taken Right From the Hacker’s Playbook

As we hear news about large-scale hacks and data breaches, there’s a temptation to picture attacks like those in television shows and films like Mr. Robot, Live Free or Die Hard and other works of fiction. These attacks are often carried out by criminal geniuses or nefarious nation-states, utilizing of a crippling zero-day vulnerability or superbug to bring society to its knees.

While such stories can make for great entertainment, is this trend toward huge, sophisticated hacks in fiction representative of real life? As it turns out, apparently not.

Penetration company SafeBreach released the second edition of their Hacker’s Playbook, which describes the experience the company’s researchers had as they simulated almost four million methods of data breaches between January and September of 2016. Those that succeeded were analyzed to establish how the hacker entered the system, how they moved about the system, and how they stole data away.

The results were surprising, to say the least. The most successful attacks that were run were those that have been around for years. The old “.exe file in the email attachment” trick was effective in a quarter of all attempts that were tested, and assorted malware-distributing exploit kits and zip files tested to be very effective as well. In short, the vast majority of vulnerabilities came--not from the cinematic doomsday plots of superbug-wielding geniuses--but from the old, tried-and-true issues and user errors. Oftentimes, measures meant to stop malware aren’t configured properly, leaving a system exposed and underprotected.

So what does this mean for your business?

Quite a bit, actually. Reflecting upon such trends, it is essentially guaranteed that a hacker could make off with whatever data they could want. However, businesses can still take preventative measures against this by implementing the proper solutions (like firewalls and spam blocking tools), educating their employees as to the threats that are out there, and properly maintaining their systems.

For assistance with any and all of these goals, reach out to Evolve IT. With our experience with network security and fulfilling other IT needs, we can provide you with a solution that best fits your company’s goals. Call (518) 203-2110 today.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Computer Upgrade Efficiency Workplace Tips Google Smartphone Windows 10 IT Support Mobile Devices Innovation Gmail Network Security Ransomware Hardware WiFi The Internet of Things Facebook Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Operating System Hacking Apple History Two-factor Authentication Small Business Phishing Best Practice App Alert Mobile Computing Networking Data storage Big Data communications Safety Data Windows Unified Threat Management Experience Quick Tips Smartphones Mobile Device Management Firewall Money Network Content Filtering Cybercrime Managed Service Provider Outlook Website Wireless Technology Android Employer-Employee Relationship Customer Service Virtual Desktop Wireless Securty Vendor Management Unified Communications Document Management Encryption Law Enforcement SaaS Router VoIP Monitors Office 365 Proactive IT Cortana Saving Money Network Congestion Analytics intranet Displays Lithium-ion battery Save Money Music Cryptocurrency Laptop Social Networking End of Support Public Speaking IBM Google Docs IP Address Education Virtualization Cleaning Holiday Writing Black Market YouTube Government Processors Keyboard Staffing Office Tips Augmented Reality LiFi Search BYOD User Downtime Passwords Hard Drives Streaming Media Help Desk Shortcut Disaster Micrsooft Remote Computing Visible Light Communication DDoS Retail Business Growth Heating/Cooling Data Management Word Recovery Robot Advertising Society Sports Managed IT services Google Wallet Spam Business Management Running Cable Information Technology Windows 8 Competition Internet of Things Bluetooth Hosted Solution Presentation Windows XP Entrepreneur IT Services Documents Automation Domains Artificial Intelligence Tech Support Compliance Memory Drones Hacker Deep Learning Social Printer Application Browser BDR
QR-Code