Hacking
How to protect your business from hacking
It's people more than computers that create computer threats. Computer criminals put others at risk for their own benefit. Give one of them access to the internet - and your PC - and the threat they present to your security can increase exponentially.

Computer hackers are unauthorised users who break into your computer system to steal, alter or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them gain access to information that you really don't want them to have.
Examples of how hacking is carried out
Hackers use a number of different techniques to accomplish their deed. Some examples include:
-
Vulnerability scanning checks computers on the network for known weaknesses that they can then exploit.
-
Password cracking involves recovering passwords from data stored on and transmitted by computer systems.
-
Spoofing attacks involve websites that falsify their data by mimicking legitimate websites. In this way, they are treated as trustworthy sites by both users and other programmes.
-
Root kit is a set of programs that work by wresting control of an operating system from its legitimate operators.
-
Trojans serve as a backdoor to a computer system to allow a hacker to gain access to the system later.
-
Viruses are self-replicating programmes that spread by inserting a copy of themselves into other executable code files or documents.
-
Keylogging are tools designed to record every button you press. Can be used to infer passwords.
Keep track of your devices
One of the most important things you can do to secure your business against hackers is to have security standards for all devices in use.
For example, you can set up rules for what can be done with the device during working hours and possibly enforce them through technology. Here you can use web protection software that blocks the user from visiting dangerous websites. Centralised management software can be used here to keep an eye on all devices.
In addition, it's important to have up-to-date antivirus.
Strong authentication
Encrypting information on the devices used is a useful way to protect data from hackers. Therefore, introduce an extra step that must be completed to use the device. This could take the form of an SMS sent to the employee's phone. The hacker would have to somehow get hold of the SMS, which can be difficult. The more difficult you can make hacking, the safer you will be.