Top 10 ways hackers get around your firewall and anti virus to rob you blind.

Page 1

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today.

an ame company

Robert Salmans

Senior Security Engineer

Integrity IT |The AME Group 3080 Harrodsburg Rd. Ste 104 Lexington, KY 40503 859-899-8841 www.integrityky.com


Are You a Sitting Duck? You, the CEO of a small business, are under attack. Right now, extremely dangerous and well-funded cybercrime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of small businesses like yours to steal credit cards, client information, and swindle money directly out of your bank account. Some are even being funded by their own government to attack American businesses. Don’t think you’re in danger because you’re “small” and not a big target like Equifax, J.P. Morgan or Home Depot? Think again. In the past 6 years new malware threats have increased 13 times to over a million every single day and HALF of the cyber-attacks occurring are aimed at small businesses; you just don’t hear about it because it’s kept quiet for fear of attracting bad PR, lawsuits, databreach fines and out of sheer embarrassment. In fact, the National Cyber Security Alliance reports that three in five small businesses have been victims of cybercrime in the last year – and that number is growing rapidly as more businesses utilize cloud computing, mobile devices and store more information online. You can’t turn on the TV or read a newspaper without learning about the latest online data breach, and government fines and regulatory agencies are growing in number and severity. Because of all of this, it’s critical that you protect your business from these top 10 ways that hackers get into your systems. 1.

They Take Advantage of Poorly Trained Employees. Employee involvement in data breaches has improved this year, but remains one of the main vulnerability for business networks. For Healthcare, employees are involved in 56% of data breaches. It’s common for an employee to infect an entire network by opening and clicking a phishing e-mail (that’s an e-mail cleverly designed to look like a legitimate e-mail from a web site or vendor you trust). If they don’t know how to spot infected e-mails or online scams, they could compromise your entire network.

2.

They Exploit Device Usage Outside of Company Business. You must maintain an Acceptable Use Policy that outlines how employees are permitted to use company-owned PCs, devices, software, Internet access and e-mail. We strongly recommend putting a policy in place that limits the web sites employees can access with work devices and Internet connectivity. Further, you must enforce your policy with content-filtering


software and firewalls. We can easily set up permissions and rules that will regulate what web sites your employees access and what they do online during company hours and with company-owned devices, giving certain users more “freedom” than others. Having this type of policy is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee is checking unregulated, personal e-mail on their own laptop that infects that laptop, it can be a gateway for a hacker to enter YOUR network. If that employee leaves, are you allowed to erase company data from their phone? If their phone is lost or stolen, are you permitted to remotely wipe the device – which would delete all that employee’s photos, videos, texts, etc. – to ensure YOUR clients’ information isn’t compromised? Further, if the data in your organization is highly sensitive, such as patient records, credit card information, financial information and the like, you may not be legally permitted to allow employees to access it on devices that are not secured; but that doesn’t mean an employee might not innocently “take work home.” If it’s a company-owned device, you need to detail what an employee can or cannot do with that device, including “rooting” or “jailbreaking” the device to circumvent security mechanisms you put in place. 3.

They Take Advantage of WEAK Password Policies. Most everyone is bad at Passwords. The recommendations have changed this year and those changes are good for the user. The most important feature is the LENGTH – at least 8 characters, but longer is better. The rules like “must contain lowercase and uppercase letters, symbols and at least one number”, are still seen often, but we are moving away IF the password is long enough. On a cell phone, requiring a passcode to be entered will go a long way toward preventing a stolen device from being compromised. The concept of adding a passcode to your password, called Dual Factor Authentication, adds layer that provides safety even for weak passwords. Again, this can be ENFORCED by your network administrator so employees don’t get lazy and choose easy-to-guess passwords, putting your organization at risk.

4.

They Attack Networks That Are Not Properly Patched with The Latest Security Updates. New vulnerabilities are frequently found in common software programs you are using, such as Microsoft Office; therefore, it’s critical you patch and update your systems frequently. If you’re under a

Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


managed IT plan, this can all be automated for you so you don’t have to worry about missing an important update. 5.

They Attack Networks with No Backups or Simple Single-Location Backups. Simply having a solid, reliable backup can foil some of the most aggressive (and new) ransomware attacks, where a hacker locks up your files and holds them ransom until you pay a fee. If your files are backed up, you don’t have to pay a crook to get them back. A good backup will also protect you against an employee accidentally (or intentionally!) deleting or overwriting files, natural disasters, fire, water damage, hardware failures and a host of other data-erasing disasters. Again, your backups should be AUTOMATED and monitored; the worst time to test your backup is when you desperately need it to work!

6.

They Exploit Networks with Employee Installed Software. One of the fastest ways cybercriminals access networks is by duping unsuspecting users to willfully download malicious software by embedding it within downloadable files, games or other “innocent”- looking apps. This can largely be prevented with a good firewall and employee training and monitoring.

7.

They Attack Inadequate Firewalls. A firewall acts as the frontline defense against hackers blocking everything you haven’t specifically allowed to enter (or leave) your computer network. But not all firewalls are the same. Known as Next Gen Firewalls, these have additional security features. All firewalls need monitoring and maintenance, just like all devices on your network. This too should be done by your IT person or company as part of their regular, routine maintenance.

8.

They Attack Your Devices When You’re Off the Office Network. It’s not uncommon for hackers to set up fake clones of public WIFI access points to try and get you to connect to THEIR WIFI instead of the legitimate, safe public one being made available to you. Before connecting, check with an employee of the store or location to verify the name of the WIFI they are providing. Next, NEVER access financial, medical or other sensitive data while on public WIFI. Also, don’t shop online and enter your credit card information unless you’re certain the connection point you’re on is safe and secure.

9.

They Use Phishing E-mails to Fool You into Thinking That You’re Visiting a Legitimate Web Site. A phishing e-mail is a bogus e-mail that is

Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


carefully designed to look like a legitimate request (or attached file) from a site you trust to get you to willingly give up your login information to a web site or to click and download a virus. Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. 10. They Use Social Engineering and Pretend to Be You. This is a basic 21stcentury tactic. Hackers pretend to be you to reset your passwords. Today, it is common for social engineers to pose as your CEO/CFO and persuade an employee to send them all their employees W-2s. Sounds like a one-time mistake, but it’s not. It’s happened to KY businesses multiple times. In another scenario, hackers pretended to be a popular online blogger and got Apple to reset the author’s iCloud password.

If you’d like a FREE 1-hour consultation to learn how your company can plug all 10 holes, give us a call at 859-899-8841.

Want Help Ensuring That Your Company Has All 10 Of These Holes Plugged? Hi, I am Phil Miller, vCIO. I am here to help you discover if your business technology is as safe, efficient and effective as you believe it to be or should be. If you are concerned about employees and the dangers of cybercriminals gaining access to your network, then call us about how we can implement a managed security plan for your business. At no cost (and with no hidden agenda or “gotcha” small print) I’d like to send one of our Chief Information Officers to your office for a FREE Security Consult to help you address a few areas we find inadequate in every Security Risk Audit performed. We’ll also look for usual places where security and backup get overlooked, such as mobile devices, laptops, tablets, and home PC’s.

Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


1. Is your network really and truly secured against the most devious cybercriminals? And if not, what do you need to do (at a minimum) to protect yourself now? 2. Is your data backup TRULY backing up ALL the important files and data you would never want to lose? Do you know exactly how long it would take to restore your files (most people are shocked to learn it will take much longer than they anticipated). 3. Are your employees freely using the Internet to access gambling sites and porn, to look for other jobs and waste time shopping, or to check personal email and social media sites? You know some of this is going on right now, but do you know to what extent? 4. Are you accidentally violating any PCI, HIPAA or other data-privacy laws? Laws are updated and it’s easy to violate one without even being aware; however, you’d still have to suffer the bad PR and fines. 5. Is your firewall and antivirus configured properly and up-to-date? 6. Are your employees storing confidential and valuable information on unprotected cloud apps like Dropbox that are OUTSIDE of your backup? I know it’s natural to want to think, “We’ve got it covered.” Yet I can practically guarantee your business is at serious risk for hacker attacks, data loss and extended downtime – I just see it all too often in the businesses we’ve audited over the years.

Trust But VERIFY Even if you have a trusted IT person or company who put your current network in place, it never hurts to get a 3rd party to validate nothing was overlooked. I have no one to protect and no reason to conceal or gloss over anything we find. If you want the straight truth, I’ll report it to you.

If you’d like a FREE 1-hour consultation to learn how your company can plug all 10 holes, give us a call at 859-899-8841.

Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


You Are Under No Obligation To Do Or Buy Anything I also want to be very clear that there are no expectations on our part for you to do or buy anything when you take us up on our Free Security Consult. As a matter of fact, I will give you my personal guarantee that you won’t have to deal with a pushy, arrogant salesperson because I don’t appreciate heavy sales pressure any more than you do. If we’re a right fit for you remains to be seen. If we are, we’ll welcome the opportunity. But if not, we’re still more than happy to give this free service to you. You’ve spent a lifetime working hard to get where you are. You earned every penny and every client. Why risk losing it all? Get the facts and be certain your business, your reputation and your data are protected. Call us at 859-899-8841. Dedicated to serving you, Phil

Here’s What a Few of Our Clients Say “We’ve never had a full-service IT firm before, but I love the easy access to support. Integrity IT’s skilled and knowledgeable technicians give us quick responses. Everyone we work with is always friendly and makes me feel like we are family! We have complete peace of mind knowing our equipment and data is being cared for and monitored 24/7. I would not hesitate to recommend Integrity IT... Quality work, experienced people at a fair price! “ - SHANNON CALLAHAN, BUSINESS MANAGER, LONG CONSTRUCTION “Using Integrity IT to host and manage our IT services simplifies our process for addressing IT issues. I have worked with many of the local IT firms and found that Integrity IT offers a more proactive approach to IT services. Previously, we had to reach out to our IT company, our ISP, and our electronic medical records company, who often couldn’t agree on who/what was at fault. Now, we just call Integrity IT, and they help us solve the problem. Integrity IT thoroughly researches and holds meetings for all big projects to make sure they are including all relevant considerations that will affect the implementation and success of the project. They have helped us with projects of all sizes from new hardware/software, our migration to hosted environment, and moving our IT infrastructure to a new location. I am very pleased with the service and support our group has received from Integrity IT. They are thorough, proactive, and responsive. I also enjoy speaking to the same Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


handful of people whenever we have an issue because they are familiar with our systems and can respond more quickly.” - MELODY BLAUSER, PRACTICE MANAGER, ORTHO KY “Having Integrity IT manage our technology day to day gives us a sense of security and peace of mind. Integrity IT staff are personable and meets you where you are. I really like that we have formed a healthy relationship with several staff members. We are very comfortable asking any question we have about our network and infrastructure. If you want someone that has patience with you, answers questions in a very timely manner, and manages your IT infrastructure seamlessly, then choose Integrity IT. We are extremely pleased with the way our IT services are managed and greatly appreciate all that has been done.” - TARI YOUNG, IT ENGINEER, FIRST BAPTIST CHURCH BRACKTOWN “Security and protecting data is always a big concern. With Integrity IT and their team, our worries regarding our protection are minimalized as much as possible. The proactive approach their team takes puts us at ease and attending their security conference really showed us they took our security concerns to heart. In the past, IT firms I worked with took a reactive approach to innovation and security. Integrity IT is proactive and innovative. We know months in advance before any changes need to be made and it helps us stay current and plan for those changes. If you want to remain ahead of other companies in your industry from a technology standpoint, you should choose Integrity IT. Their dedication to bringing ideas and concerns to your attention before it is too late is something that any company should value.” - MILES BELL, CHIEF FINANCIAL OFFICER, CLAY INGELS “I have a love/hate relationship with IT. Thank you so much for making it a lot more love than hate. I cannot tell you how lost we would be without our account manager and the Integrity team!” - ERIC BROOKS, ASHLAND OF HENRY CLAY ESTATE “Integrity IT has consistently demonstrated their ability to execute and deliver, which is why we recommend them to anyone in the market for business IT.” - CROSWELL CHAMBERS, CIO - HOSPICE OF THE BLUEGRASS “Integrity IT has been our sole IT resource for eight years. For half the cost of a dedicated IT team member, we get access to a broad team of experts and an advanced support infrastructure. Partnering with Integrity IT is a no-brainer business case. “ - JIM PEYTON, PRESIDENT – KINEMETRIX

Integrity IT | The AME Group | 3080 Harrodsburg Rd. Ste 104 | Lexington KY 40503 | 859-899-8841 | www.integrityky.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.