With almost one billion mobile connections in place, it is easy to understand why these devices are targeted by hackers. Employees connecting at Starbucks, in airports, on planes and in hotels open themselves up to additional security breach risk by accessing information through mobile hotspots. Mobile hotspots can be easy targets for hackers by setting up spoofs to get your employees to unknowingly log into unsecure networks, making them vulnerable to Man in the Middle (MitM) exploits. As an employer, it may be impossible to prevent employees from using hotspots, so it is very important to take steps to protect your business.
According to a recent Trends in Information Security report by CompTIA, malware, hacking, privacy and data loss/leakage top the list of serious concerns over security threats. Companies large and small have been victims of these security threats. While large corporate security breaches makes the news, smaller companies may not have the vigilance to detect, and the resilience to survive a network security breach. Hackers have evolved and are now more sophisticated than ever. Network Monitoring can identify security exploits before it is too late.
Have you noticed? The largest US Based Cyber-Security Hacks in recent years have all come up on the “vastly over-rated” AT&T Network? According to sources close to the investigation say that would just be a matter of fact. Not much satisfaction to the “infected” but here’s what AT&T says: https://www.csid.com/attcustomercare/
Big data breaches have been making headlines more and more frequently. It was announced last week that the computer systems at the U.S. Office of Personnel Management had been breached. This is the second computer break-in in the past year for the agency. An estimated four million current and former federal employee records may have been compromised.
US ProTech named to the RSA Top-20 List of Security Solutions providers for 2015! Read the article published by CIO Review magazine about US ProTech’s CEO and founder, Jonathan Goetsch. To view the entire magazine, click here and read: New Tools That Demystify IT Security and Measurably Quantify Risk, by Goetsch.