Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? Professional Computer Associates can help. To learn more, reach out to us at 845-876-6561.

Which Approach Puts Your IT in a Better Position?
Tip of the Week: Saving a Windows Product Key to a...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Disaster Recovery Mobile Devices Microsoft Software Productivity Business Internet Email Business Continuity Data Innovation Outsourced IT Data Backup Cybercrime Efficiency communications Ransomware Smartphones IT Support Windows 10 Computer Hardware Cloud Computing IT Services Browser Android Data Recovery Internet of Things Office BDR Computers Server Telephone Systems Business Management Windows Alert Saving Money Tech Term Cybersecurity Upgrade User Tips Mobile Device Management Virtualization Small Business Network Smartphone Quick Tips Chrome Workplace Tips BYOD Managed IT Social Engineering Save Money Microsoft Office Law Enforcement Collaboration Private Cloud Passwords App Hacking Firewall Mobility Office Tips Bandwidth Work/Life Balance Router Managed Service Provider Avoiding Downtime Facebook Money Productivity Communication Holiday Recovery How To Office 365 Artificial Intelligence Social Media Password Miscellaneous Data Management Flexibility Wi-Fi VPN Bring Your Own Device Business Intelligence Two-factor Authentication Proactive IT Applications Operating System HaaS Remote Monitoring Gmail Data Protection Automation Phishing Information Technology Data Security Budget Health Redundancy Document Management Gadgets Vulnerability Managed IT Services Black Market Risk Management Apps Google Drive Blockchain Identity Theft Employer-Employee Relationship Cleaning Compliance Mobile Device Windows 10 SaaS Data Breach Word Big Data Safety Spam User Error Marketing Connectivity Entertainment Value Scam Update IT Support Wearable Technology PDF Save Time CES Smart Tech Computing Infrastructure Data Storage Automobile Physical Security Mobile Computing Website Worker Content Management USB Workers Legal Downtime DDoS Battery Training Credit Cards Windows 7 History Education IT Management Best Practice Content Filtering Meetings Wireless Data storage Shadow IT OneNote IT Plan Apple Government Charger Networking Access Control End of Support Internet Exlporer Electronic Medical Records Infrastructure Unsupported Software eWaste Solid State Drive YouTube Servers Hiring/Firing Analysis HIPAA Settings The Internet of Things Comparison Computer Care Sports Streaming Media Samsung Patch Management Spam Blocking Public Cloud Remote Computing Paperless Office Data loss Business Owner Encryption Keyboard Wireless Technology Devices Telephony Wireless Charging Windows 10s How to Hybrid Cloud Customer Students Bluetooth Criminal Screen Mirroring Loyalty IoT Frequently Asked Questions Notifications Experience Techology Colocation People Chromecast Safe Mode Workforce Thought Leadership Skype Transportation Fiber-Optic Fax Server Healthcare Google Docs Cast Telecommuting Excel Music Mobile Office File Sharing IT solutions Uninterrupted Power Supply Content Filter Start Menu Benefits Cables Audit Electronic Health Records Remote Work Assessment Insurance Tip of the week hacker Business Technology Storage Mobile Smart Technology Unified Communications Computer Fan Knowledge Machine Learning Voice over Internet Protocol Rootkit Television Practices Windows Server 2008 Troubleshooting Antivirus Virtual Assistant Professional Services Theft FENG Data Warehousing Content Network Congestion Multi-Factor Security Human Resources Public Computer Hosted Computing Hosted Solution Emails Going Green Telephone System WiFi Robot Tech Support Addiction Tools Two Factor Authentication Cortana Distributed Denial of Service Audiobook Relocation Trending Vendor Management Staff Fraud Inventory Regulations Laptop Cache Google Apps Digital Signature Politics IT Consultant Hard Drives HVAC Lifestyle IaaS Touchpad Amazon Video Games Outlook Wireless Internet Botnet Mouse Users Strategy Leadership Enterprise Content Management Unified Threat Management Amazon Web Services IBM Authentication Books Netflix Scalability Internet exploMicrosoft Humor Wire Travel Password Manager Root Cause Analysis Virtual Reality Software Tips Lithium-ion battery Environment iPhone Password Management Online Shopping Supercomputer Nanotechnology Flash Emergency Running Cable Instant Messaging Advertising Monitor Smart Office Employer Employee Relationship Business Mangement Worker Commute Accountants webinar NarrowBand NIST Specifications Evernote Current Events Sync Search SharePoint Reputation Software as a Service Computer Accessories Recycling HBO Conferencing Files Cryptocurrency Millennials Administration Twitter Company Culture Managing Stress Webinar Thank You IT solutions Congratulations CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!