It's not an account I use often these days, but I do need to tidy it up as there are many personal documents stored there so I have kept the mailbox open. I also use that particular email address as a user-name for other non-work-related sites that I log in to.
"I noted the time as 4:48am for the multiple attempted log-ins!"
There is no way I was logging in to that account at that time of day so it was an obvious attempt at hacking my account and would have been successful if it was not for the backup security feature that I had switched on many years ago.
There are continual attacks on internal and external systems and oversights can lead to your systems being compromised. I have come across networks that have been shared by a property client with their tenants. Also, without consideration that the tenants may be able to access the main network or that hackers can jump from a tenant's computer to the host's network with ease.
With Internet Protocol (IP) being as forefront of any home or commercial network, then having network separation, secure passwords and 2-factor authentication is a must. With almost every device connected to the network, ensuring that all device names and passwords have been changed from the factory settings is also vital.
With VoIP handsets, IP cameras, fire alarm systems and the myriad of IoT-connected devices (Internet of Things) such as Smart Speakers, TVs, conferencing equipment, Wi-Fi access points that are always connected, there are plenty of in-roads to your network.
It takes just one device that has been left on a factory username and password (e.g. admin/admin, admin/password or admin/1234xxxx etc) to be able to plant sleeper/sniffer viruses that basically lay there collecting information until the hacker/threat actor (as known in the cyber-criminal world) has a way in to capture and encrypt your data and ask for a big sum of money, usually in Bitcoin.
"Don't be fooled if you are using the cloud to do your work!"
If you use a computer that has stored all your passwords on Google Chrome, by accessing the desktop, logging into Azure or AWS (Amazon Web Services) using the stored password on your browser is now as common as hacking into a server.
Remember to stay safe and tighten up all those security risk factors in 2024.
Until next time ...
Would you like to know more?
If anything I've written in this blog post resonates with you and you'd like to discover more about security risk factors for your business, it may be a great idea to give me a call on 01604 926100 or take a look at my website which you can find by clicking here.
The word 'Technology' has too many connotations in today's world!
Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT).
Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.
BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.
I am your technology problem solver and I look forward to helping you.
No unauthorised use, duplication, distribution or modification to any original content contained within this blog is permitted without prior written permission of the author. All other trademarks and registered names are acknowledged.