Is My Business Being Hacked?
Is My Business Being Hacked?
I get asked all the time about web sites or business computers being hacked. Specifically, someone asks me whether his Internet site is being hacked or internal computers are being attacked. My answer is always the same.
"Yes. Your business is being attacked. Your web site and your internal computers are both under attack right now. No, I don’t need to look. Yes, I’m quite confident."
It feels strange to give an absolute answer to this question. Most of my answers start with, “It depends” or “probably” and get even more conditional from there. But for this question, the answer is always the same. Yes, there are nasty people out there right now attacking your web site. They’re also attacking your work computers, your home computers, your phones, and anything else they can reach.
Why Attack Me?
Why is a common follow-up question. Why would an attacker hack into your web site or internal systems? Because your assets are assets. All assets have value, and attackers know it. Attackers have to pay bills just like you and me, and they need to compromise valuable assets to pay those bills. So an attacker hacks with the intent of extracting something of value.
You might believe that your web site or computer has nothing of value. I’m sad to say that you’re wrong. The web site you run, the old boring PC you use, the outdated smartphone… these all have tremendous value to an attacker. Just because the news only reports when Google and Apple and Microsoft get hacked doesn’t mean that smaller or less confrontational sites are of any less interest. I’ve personally seen successful attacks that targeted:
- Personal Facebook pages
- Cell phone contact lists
- Holistic medical web sites
- Cooking recipe web sites
- Flickr photo streams
- Charity donation pages
- Personal blogs
- My mother’s desktop computer
I’ve also seen successful attacks against businesses of every type and size. From a two person specialty clothing shop to Amazon.com attackers are interested in hacking anything they can.
Is All This Hacking a Problem?
Yes. Because eventually the attacker will succeed and compromise whatever assets you have.
The most well-defended resources on the Internet already know that their defenses aren’t perfect. There is always the possibility that a bug is found, that a password gets discovered, or that a smart hacker finds a crafty new way into a system. And when these well-defended resources are compromised there needs to be a fast and well-planned response in place.
The biggest problem is that you probably don’t expect a hacker to compromise your assets. As a result you’re not prepared to quickly respond and fix the problem. You probably won’t know that the hacker was in your systems, or it may be months or years before you find out. During that time they could have been monitoring accounts, stealing personal data, or embezzling funds.
How Do I Stop Them?
Prevention is the best approach to computer security. The best way to stop hackers is to make sure they never get into your systems. And the best way to do that is to learn their techniques. I teach a class on Certified Ethical Hacking where we examine exactly how hackers work, the tools they use, and how they get into systems. I show my students how to use this knowledge to think like a hacker, find the weaknesses, and then fix the weaknesses before an attacker exploits them.
There are a few rules of thumb that, while not perfect, usually make it much harder for hackers to compromise your systems by protecting what hackers first look for. These include:
- Keep your operating systems and applications up to date. This means Windows itself as well as applications from companies like Adobe, Microsoft, Google, Oracle, and Mozilla.
- Monitor your systems. If your web sites or databases change unexpectedly, you may be seeing evidence of an attack in progress.
- Never trust others with your passwords. Over and over I see a situation that began with one employee loaning a password to another and escalated into a massive compromise.
- Get training on security. Most IT careers involve security to some degree. Formal training is an investment in preventing future incidents. Even a week or two of security training now will serve you well during your entire IT career.
I wish your web sites and computers were impervious to all forms of attack. But that’s not possible. Just remain aware that you and your assets are targets and that a few basic techniques can help prevent successful attacks from ruining your day.
Mike Danseglio -CISSP
Interface Technical Training – Technical Director and Instructor
You May Also Like
A Simple Introduction to Cisco CML20 3668 0
Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2
Configuring Windows Mobility Center and How to Turn it On and Off1 1404 1
Video transcription Steve Fullmer: In our Windows training courses, we often share information about the Windows 8.1 Mobility Center. Mobility Center was introduced for mobile and laptop devices in Windows 7. It’s present and somewhat enhanced in Windows 8. Since we don’t have mobile devices in our classrooms, I decided to take a little bit … Continue reading Configuring Windows Mobility Center and How to Turn it On and Off
OSPF Adjacency Troubleshooting Solution – Getting Close to the OSPF adj0 246 1
In this video, Cisco CCNA & CCNP instructor Mark Jacob shows how to troubleshoot OSPF Adjacency issues by showing the distance between routers with the show ip ospf neighbor command.