Network Security Risks you are not taking into account

Even with a very secure network internal attacks are the most effective and hardest to prevent . Some of these are :
USB thumb drives : a malicious user can infect a usb thumb drive with a virus that can spread to all the computers on the network but also allow him to use the infected computer as a host for external attacks . In addition usb drives can be used to run malicious scripts that dump the users login information and stored on the drive for later use without the user knowing.
Laptops : Laptops are small and easy to move around and most have an ethernet port allowing it to connect to the network . Users can use laptops to either launch malicious attacks within the network . Laptop should not be used to store sensitive data like salary information, medical records, home addresses, phone numbers and Social Security numbers are just a few obvious examples . Since in many instances these laptops have gone “missing” and without a proper encryption algorithm they are easy to extract data from.
Wireless access points : They are a heaven prone to attacks but offer an easy way to connect multiple devices to the network . Without proper security and encryption protocols in place they can be exploited by creating fake Accesses points that UN-suspecting users connect to exposing their data . Also they can be shutdown using multiple de authentication packets overloading the access point and kicking all devices off the network .
Email : Email is frequently used within businesses to send and receive information from one person to an other. However ti can be misused is such a way that confidential data is forwarded to external targets. Furthermore emails can carry infected files and many users will open the files without knowing and infecting their computer and the whole network . One of these viruses is the infamous ransomware virus that encrypt the users data and demands a large sum of money so they data will be unlocked.

Leave a Reply

Your email address will not be published. Required fields are marked *