Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? Professional Computer Associates can help. To learn more, reach out to us at 845-876-6561.

Which Approach Puts Your IT in a Better Position?
Tip of the Week: Saving a Windows Product Key to a...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Hackers Business Computing Network Security Backup Malware Managed IT Services Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Business Continuity Business Mobile Devices Email Outsourced IT Internet Productivity Data Innovation Windows 10 Ransomware Smartphones IT Support Cybercrime Efficiency Android communications Computer Hardware Data Backup IT Services Browser Office Cloud Computing Alert Computers Server Telephone Systems User Tips Mobile Device Management Windows Data Recovery Virtualization Small Business Saving Money Smartphone Business Management Network BDR Quick Tips Chrome BYOD Upgrade Social Engineering Internet of Things Cybersecurity Mobility How To Save Money Work/Life Balance Microsoft Office Law Enforcement Avoiding Downtime Holiday Collaboration Recovery Productivity Social Media Miscellaneous Private Cloud Workplace Tips Passwords App Hacking Firewall Office Tips Managed IT Wi-Fi Facebook Proactive IT Phishing Money Operating System Data Security HaaS Gmail Office 365 Information Technology Health Redundancy Remote Monitoring Business Intelligence Data Management Budget Bring Your Own Device Two-factor Authentication VPN Password Managed Service Provider Bandwidth Communication Data Protection Flexibility SaaS Tech Term Apps Spam Router Compliance Automation Mobile Device Safety Data Breach Vulnerability User Error Marketing Managed IT Services Big Data Identity Theft Gadgets Black Market Artificial Intelligence Windows 10 Value Risk Management Google Drive Cleaning Employer-Employee Relationship Worker Best Practice Automobile Meetings Comparison Wireless Data storage Shadow IT Apple Government End of Support Legal Internet Exlporer Spam Blocking eWaste Battery CES Data loss Training Settings Update The Internet of Things Content Filtering Applications Charger Public Cloud Remote Computing Entertainment Data Storage Encryption Electronic Medical Records Wireless Technology Workers Solid State Drive Hiring/Firing Wearable Technology PDF Computer Care HIPAA Computing Infrastructure Credit Cards Samsung Physical Security Mobile Computing Patch Management IT Management Business Owner Keyboard Scam Word OneNote IT Plan Document Management Downtime DDoS Unsupported Software Save Time History Benefits Recycling Relocation Travel Root Cause Analysis Laptop Software Tips Wireless Charging Online Shopping Flash Assessment USB Smart Technology IaaS Criminal Touchpad Rootkit webinar IoT Specifications Fiber-Optic Evernote Outlook Sync Television Mouse Troubleshooting Software as a Service YouTube Millennials HBO Conferencing Content Smart Tech Internet exploMicrosoft Cables Humor Telephony Public Computer Windows 10s Hosted Solution Screen Mirroring Lithium-ion battery Two Factor Authentication Environment Education Content Management iPhone Workforce Frequently Asked Questions Vendor Management IT Support Running Cable Audiobook Insurance Advertising Unified Communications Monitor Skype Sports Streaming Media Cast Blockchain Google Docs NarrowBand Telecommuting Excel Politics Practices Hard Drives SharePoint Video Games Theft Reputation Start Menu Networking Audit Users Human Resources Files Website Hybrid Cloud Remote Work Tip of the week Unified Threat Management Hosted Computing Scalability Cortana Customer Mobile IBM Computer Fan Books Chromecast Notifications Knowledge Virtual Reality Staff People Colocation Voice over Internet Protocol Windows Server 2008 Inventory Fax Server Instant Messaging Google Apps Professional Services Supercomputer FENG Emergency Data Warehousing Employer Employee Relationship Network Congestion Worker Commute Digital Signature Mobile Office Multi-Factor Security Windows 7 Uninterrupted Power Supply Emails Access Control IT solutions Search Infrastructure Tools Current Events Computer Accessories Strategy hacker Trending Fraud Regulations Authentication How to Password Manager Bluetooth IT Consultant Antivirus Analysis Lifestyle Techology Amazon Loyalty Experience Transportation Business Mangement Botnet Going Green Leadership Accountants WiFi Amazon Web Services Robot Servers Tech Support Netflix Distributed Denial of Service Music Thank You Congratulations Webinar Administration IT solutions Nanotechnology CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!