![]() |
Image: Pinterest |
When we are thinking about data security, we are finding many cases, where people are thinking that they are over the top. But the fact is that those people are sharing things, what is uncovering their identity. During the web meetings, those people can share things like the models of their computers and the network names of the computers. That thing can give very important data for hackers. The people are one of the weakest rings in data security.
People can be tired when they are using computers, and they can accidentally share even passwords and access confidential information on social media. Even if the password is shown only a couple of seconds the hacker can steal it by using a screenshot. And people, who have access to confidential information are good objects for stalkers in social media. So the hacker can try the password, even if it is seen only a couple of seconds.
Captured web cameras can deliver data about passwords and workplaces. Things like numbers of the micro support can be on the walls, and that thing can make hackers attempt to get passwords and usernames just by calling that number. That thing can be denied by keeping the list about the telephones that are allowed to get service. The data can tell the time when people of the office are on vacation, and the intruders can visit the workplace and photograph memos.
They can share the data, what can uncover the place, where their workplace is. And finally, they can tell many things about their employees, what are a risk for data and other types of security. An image about own computer can uncover the language of the user. And if the language on the screen is not quite common, that can uncover the identity of the user of the system.
In some of the scenarios what is made for the cyber attack, the attacker would try to destroy the server by using a computer virus or by making a physical attack. Then the "red team" will slip into the house, and replace the server by using their system. The thing that this team must be done is just turn the RAID 5 backup to the wrong address, and then that backup will download the all data from the targeted server to the attackers' server.
The fact is that the data security is entirety. If somebody will break into the office, that person can put the eavesdropping and camera tools in the workspace. Or that intruder can kidnap the actor of the company, and then force the person to talk. So the data security is not only firewalls but also physical security. And if an intruder can slip into the house, that thing allows infecting the system simply by changing the hard disk or leaving the mobile telephone, which is infected by the virus on the table. The surveillance cameras can capture every single code, that is written on the screen. And that's why people should remember that data security is the entirety.
One of the best ways to benefit social hacking is to kiss or praise people. The idea is to act like some vamp in the old movies. The attacker would just praise the skills of the targeted person, and then cheat the target to uncover the places, where the passwords are kept. Or maybe the attacker would play a very hard-working person, and do the job well. But in that case, the hacker leaves the gate open for attackers, who know the right code.
If the motive for hacking is money the hacker team's benefit is not to share data with everybody. They want to sell the stolen data for the people, who are paying for those things. And the unhappy persons are good targets for criminals. If the hard-working person is always kick off because there is always somebody younger, thinner, and more athletic that causes disappointment, and disappointed people are good objects for hackers.
They would not care about the instructions, and that means the data security might be dangered. Or they can give the company mobile telephone to "some MC guys" very easily. Those people might make the fake robbery, and give money for that kind of thing.
One of the biggest problems with data security is people, who are not following instructions. They might ask the passwords by using telephones. Or those people are not interested in keeping their systems updated. That means that in their basements will working some server from the year 2010, and that kind of servers are dangerous because there might be many holes in the security of those kinds of systems.
When we are turning to remote offices and remote working we are believing that people always follow regulations. We are believing that people are always making everything by using the gift computer, which is delivered to the workplace. So the workplace can control everything, what we are doing, by installing small tracking application in the workplaces computers. That application allows that the data security personnel would control things, that is done by that computer. And of course, the virtual meetings require the use of the systems, that are given by the workplace.
The thing is that when people are using some computer in the web meetings they should use some other computer for the things, what that person wants to hide from the workplace. During web meetings, hackers have an easy chance to split the tracking application to the computers, which are used in web meetings. Web or net meetings are long-term things, what is using the same connection during all the time, and that thing allows to make the scannings in the computers, what are participating the meeting.
And that means for things, what person wants to keep private should use the different computer and the user accounts than during those web meetings. The fact is that the web meetings can be faked, or they can be observed by using eavesdropping equipment. So during those meetings, people should concern what they are talking, and what they can share. The fact is that when other people are looking at the room through the screen, they might think that the person, who is on the screen and seems to be alone might not be alone at all. There could be many people outside the sector of the camera.
The simplest way to share the data from the computer is just to take the images of the screen by using the camera. And of course, people can use their privately owned WLAN stations for their private use. Or they can also bring their laptops to the workplace, and use them by using the mobile telephones mobile web abilities for the system. By using their network the person can avoid the watchdogs, what is installed in the building's WLAN.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.