ua-136281795-1
By: PointPitt
Business Security / Computer Security / Information Security / ITS SafeTM Security / Uncategorized
Comments: No Comments
Here are just a few of the situations IT Security Solutions has encountered when performing an assessment.
All of the comments are focused on organizations with more than 2 computers in their network, a Firewall and Virus protection on each computer. If this describes your organization, then your business could be at serious risk
Attackers exploit the distribution of Social Media channels to connect and control tens of thousands daily. To the intruders, this is like shooting fish in a barrel.
The above was written before the Pandemic put all of us in a Work from Home effort.
Before the Pandemic, there was a definite definition of security protecting the organization. This was how the security of the organization looked. However, the security of organizations evaporated during the Pandemic, see the figure just below.
Even the VPNs that connect back to the Office, bypass the firewall and are permitted directly. Think about the security at your employees’ homes. Is there any wonder why the attacks are concentrating now at home?
The part that is missing above is the lack of screening from employees and the use of VPNs. The VPN is intended to Mask the communications from one endpoint to the other while connecting over the Internet. VPNs do not protect the connection or the business. The Firewalls permit the VPNs to connect internally and do not filter any information. You may expect that the VPN protects your business, but this is not the case.
The VPN permits direct communications to the office and repeats the same situation that was exposed during the Target breach. The Target breach permitted the infected computer of the HVAC Vendor to get access to the entire network, and the credit card information. That was a recipe for disaster.
How many of the above items can you relate to? Do you have the tools we describe above? Do you want to prevent the attacks on your computers, or allow the Intruders to continue to have access to your environment? (prevention is the cure).
Bonus
Your network has likely evolved beyond the initial PCs, and Printers. Many networks have added WiFi, personal Devices, and many other Internet of Things (IoT) devices which have no protects either.
Our personal devices (cell phones, tablets) are never off of the Internet, and we insure that they have sufficient power at all times. We are now so dependent on these devices, that we also allow Business Communications on them as well.
This presents the opportunity for attackers to engage in our want for information, as well as the convenience of connecting to everyone (including high value targets), to get the access and information that they are seeking.
The critical problem here is that you cannot stop, what you cannot see. We have the tools and experience to highlight the unseen activities, and stop the attackers before they can succeed.
_______________________________________
IT Security Solutions, Inc. is a Pittsburgh based technology company with 25+ years of cyber security domain expertise catering to businesses of all sizes. The solutions offered range from technology security audits and penetration testing to continuous network scanning. The company recently launched ITS Safe™, a proprietary managed security solution that blocks hackers from attacking networks – the largest IT security threat facing businesses today.
Year after the year, the Pittsburgh business community recognizes IT Security Solutions, Inc. for their domain expertise and thought leadership in the cyber security space.
Contact IT Security Solutions to discuss how you will benefit by reviewing your security today.
www.IT-Security-Solutions.com www.ITS-Safe.com
412-889-6870 – info@IT-Security-Solutions.com