~favouritE buSinESS toolS~
SEcurity
PRoTECT AGAINST HACkERS
How to ensure your emails and phone systems are watertight
I
n recent months data security headlines such as the phone hacking scandal by News of the World journalists
has highlighted the importance of small and medium-sized enterprises (SME) being diligent in protecting company data. Joe Stewart, director of malware
research at the counter threat unit at Dell SecureWorks, says that while there is more awareness among SMEs about computer security and data protection now compared with five years ago, there is also more activity. ‘It has got to the point now where any
criminal can just go out and purchase all the tools to carry out these types of online identity theft or potentially stealing attacks, and they don’t have to have much knowledge about how it all works,’ he says.
access all areas
Stewart says most of the cyber attacks are actually carried out using malware, which is short for malicious software. Normally, malware is the way hackers access and maintain a presence illegally in computer systems, and unfortunately, they have found a sweet spot in SMEs. ‘Hackers especially like it when they get
access to a business because it means, with some work, they might be able to interfere
‘It has got to the point now
where any criminal can just go out and purchase all the tools to carry out these types of online identity theft’
with the finances of the business bank account, and therefore get away with some pretty hefty sums,’ he explains. Nick Steele, consultant at information
security-focused Red Island Consulting, advises that voicemails should be protected by a PIN number, which should also be changed on a regular basis. ‘In addition, IT and telephone departments should pay particular attention to verifying the identity of users requesting password resets,’ he says. Steele adds, ‘The recent issues around
voicemail hacking were often aided by the exploit of “pre-texting” – pretending to be a user to gain access to the password, or to have the password reset. Again, back all this
up with clear, sensible and above all easy to follow company policies and guidance.’ After GHM Communications spoke to its
network provider and learned that people had been trying to access its phone system, it was time to make sure all precautions were taken to safeguard against attacks.
Hacked off
Engineering manager Stan Matthews says that businesses can be hacked by criminals dialling a random direct-dial number and taking a chance that it would divert to a mailbox. A mailbox unprotected by a password would have a default of 0000. A hacker would know this and set the mailbox to forward calls externally to premium rate or international numbers. ‘It’s important to always ensure that all
mailbox pass codes are changed from the default setting. Remove any unused mailboxes and bar all ports from making external calls in night service and at weekends and bar all spare ports from making external calls,’ says Matthews. n
buSinESS xl 27
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60