Top Online Vulnerabilities

June 7, 2016 8:00 am

In the tech world there are not of gray areas but there are two certainties that are happening right now that can impact the security of your business. The first is that the use of the internet for business such as ecommerce, email, data storage, and so on is drastically on the rise. The second certainty is that security breaches are also at an all time high. Put these two together and there are serious vulnerabilities when it comes to online business dealings and security breaches. An effective approach to IT security must, by definition, be proactive and defensive. Let’s examine the top online vulnerabilities before they impact your business.

 

  • Account Weaknesses – Specific weaknesses of accounts online include the one you probably hear about the most and possibly ignore – password protection and a weak password policy. A weak password policy could allow unauthorised access to the application or the wider system, resulting in severe compromise or gaining of root privilege.
  • Data Leaks – According to ZDNet, databases may be considered a “back end” part of the office and secure from Internet-based threats (and so data doesn’t have to be encrypted), but this is not the case. Databases also contain a networking interface, and so hackers are able to capture this type of traffic to exploit it. To avoid such a pitfall, administrators should use SSL- or TLS-encrypted communication platforms.
  • Keylogging – Keylogging is designed to record the user’s keystrokes. Keylogging allows criminals to look for particular bits of information that can be used for identity or intellectual property theft.
  • Mobile Security & Smartphone Vulnerability Threats – Cybercriminals can easily exploit vulnerabilities in your mobile phone to obtain private data. These vulnerabilities sometimes come from the apps you use or within your smartphone itself. Mobile phones are also vulnerable to malware, which can log keystrokes and capture screenshots. Protect yourself by researching the apps you download, being careful with what emails you open, and which pictures you decide to upload.
  • Phishing Attacks – When cybercriminals trick people into revealing sensitive information such as passwords and social security numbers, it’s called phishing. One of the most common ways phishing happens is when a person receives an email, purportedly from a bank or government organization, and are lured to authentic-looking sites. Once there, the person is asked to enter their password, social security numbers, and financial data. This could be devastating for your business if they get into your secure client data.

Categorised in: , , , , ,