Strengthen your network security chain
Voice and Data|December 2020
A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it
PAUL DUCKLIN
Strengthen your network security chain

Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.

If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.

For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.

Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.

Denne historien er fra December 2020-utgaven av Voice and Data.

Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.

Denne historien er fra December 2020-utgaven av Voice and Data.

Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.

FLERE HISTORIER FRA VOICE AND DATASe alt
Businesses in a quandary as India battles mobile spam
Voice and Data

Businesses in a quandary as India battles mobile spam

TRAI's new SMS regulations target spam but could disrupt legitimate business communications, while OTT platforms like WhatsApp remain difficult to regulate

time-read
4 mins  |
september 2024
Coca-Cola cloud brings a golden harvest for Infosys
Voice and Data

Coca-Cola cloud brings a golden harvest for Infosys

Infosys is set to significantly benefit from Coca-Cola and Microsoft's cloud alliance, highlighting India's pivotal role in enabling digital transformation worldwide

time-read
4 mins  |
september 2024
India's cosmic odyssey: Reaching for the Moon and beyond
Voice and Data

India's cosmic odyssey: Reaching for the Moon and beyond

India's space ambitions extend beyond Chandrayaan-3, with plans for lunar sample returns, a national space station, and cutting-edge launch vehicles

time-read
4 mins  |
september 2024
SMEs scale new heights with cloud
Voice and Data

SMEs scale new heights with cloud

Cloud technology empowers Indian SMEs in BFSI with scalability, innovation, and security, enabling them to compete with larger firms and drive growth

time-read
2 mins  |
september 2024
Not a chip off the same block
Voice and Data

Not a chip off the same block

eSIMs are reshaping connectivity with seamless switching, enhanced security, and loT integration while navigating challenges in adoption and regulation

time-read
9 mins  |
september 2024
Powering 'Tech Olympics' in Paris
Voice and Data

Powering 'Tech Olympics' in Paris

How the Paris 2024 Olympics redefined global sports, blending Al, 5G, and digital twins to set new standards and pave the way for the future of sporting events

time-read
6 mins  |
september 2024
"5G has consistently influenced complementary technologies"
Voice and Data

"5G has consistently influenced complementary technologies"

With over 34 years of experience in the IT services industry, Dinesh Rao currently serves as the Executive Vice President and Co-Head - Delivery at Infosys.

time-read
5 mins  |
september 2024
"AI applications and hybrid work models are drivers of SASE adoption"
Voice and Data

"AI applications and hybrid work models are drivers of SASE adoption"

With extensive experience in leading product management for Secure Access Service Edge (SASE), Software-Defined Wide Area Network (SDWAN), and Security Service Edge (SSE) solutions across various enterprises, Andrew Winney currently serves as the General Manager and Global Head of SASE Business at Tata Communications.

time-read
5 mins  |
september 2024
TELECOM'S GREEN SIGNAL FOR GROWTH
Voice and Data

TELECOM'S GREEN SIGNAL FOR GROWTH

As technology leads India's sustainable transition, innovations like 5G and green energy are paving the way for inclusive growth and environmental stewardship

time-read
4 mins  |
september 2024
The BIG Leap
Voice and Data

The BIG Leap

As Indian enterprises embrace 5G, they are driving innovation, unlocking new possibilities, and paving the way for the next industrial revolution

time-read
6 mins  |
september 2024