logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
20th September 2019 by CyberVision 0 Comments 1041 Views
20th September 2019 by CyberVision in Business Security

Vulnerabilities inside the network

The advanced technology in today’s day and age has allowed for our network security devices to do a good job of protecting our networks from malicious malware and criminal hackers. Many software products and networks come with built-in protection against hackers, keeping the unwanted out. However most times the actual cyber threat is already inside of the network. Here are 3 examples of how one’s network can be targeted and how to prevent attacks:

 

  1. Email

Email use is more common in a working environment, but the threat against an organisation’s confidential information is just as big as any data leak. Being able to identify malicious emails and tightening spam settings in an email application will help to stay on top of things.

 

  1. USBs

USB thumb drives may well be the most common ways to infect a network from inside a firewall. They’re inexpensive, have the capacity to hold large amounts of data and can be used between a variety of server types. Ensure that the computer or laptop’s default autorun policies have been changed. These settings allow a computer or laptop to launch scripted start-up actions automatically.

 

  1. Wi-Fi Hotspots

Wi-Fi hotspots are generally vulnerable to attacks and whether encryption is used or not is not even a factor. It is always advised not to use open networks due to the level of risk being heightened when doing so.

 

With the ever-increasing emphasis on, and demand for, cybersecurity, it should be a priority to make sure that an organisation’s or private information is adequately protected. One should also be mindful of cyber security etiquette, exercise common sense and practice safe computing habits. All software should be kept up-to-date and the latest security patches installed as soon as they come out. Due diligence will pay off in the long run.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure cyber security
  • network protection
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo