Busting The Top Four Myths About Hacking

By Torben Andersen, CCO, SMS PASSCODE

Are you protecting your data with just a password? If your answer is no, and you have strong multi-factor authentication in place, then good job: you are free to go out and enjoy the sunshine. If you answered yes, then stick around for a few more minutes to learn why a password alone is not enough to secure access to your corporate networks and applications.

Still here? Okay then, allow me to start by busting some of the typical myths about hacking today.

1# Myth – Hackers only target the big brands
blog-image-1

When big brands like Target, eBay, Adobe, and Sony are hacked, it’s big news for business and mainstream publications. Don’t be fooled: big companies aren’t the only ones being targeted. In fact, research shows that 31 percent of all hacking attacks were aimed at businesses with fewer than 250 employees.

2# Myth – You have nothing valuable for hackers to steal

blog image 2.jpgFair enough. Not everyone is fortunate enough to be storing breakthrough research with the potential to revolutionize your industrythe world if only you can keep it secret long enough to secure a patent. But what about your business email? Email often contains highly sensitive data, such as competitive bids, investment plans or pipeline information. Imagine the damage if these details were to fall into the wrong hands.

There’s even more low-hanging fruit to steal if hackers breach your network. Customer records, credit card information and even employee user credentials are worth as much as $50 USD per record when sold on the Internet. An entire shadow economy has emerged online with brokers selling stolen user records; according to the FBI, cybercrime has become even more profitable than drug-related crimes. This makes everyone a target.

3# Myth – Your anti-virus and network vulnerability tests will keep you safe

blog-image-3Patch management, updated anti-virus applications and frequent network vulnerability tests are all good weapons in a defense against hackers. However if you are not securely authenticating your users when they access your corporate networks or applications, then you’re leaving the front door open for the hackers. Research shows that weak or stolen passwords are exploited in 76 percent of all network breaches. So, yes, this really is the hackers’ preferred way in.

4# Myth – Hackers are teenagers lurking in a basement somewhere

For most of us, the word “hacker” prompts images of pale teenage boys with long hair, black t-shirts and a serious grudge against Microsoft. While many hackers probably still fit this description, the reality is that the hacker has evolved. Today’s hacker is highly-educated, well-connected, and well-equipped, enjoying a high-income profession as a professional cybercriminal. The hackers have some powerful tools at their disposal, and many poorly-protected victims has made hacking easier than ever before, resulting in cybercrime becoming the fastest growing crime type in the world.

Hackers’ motive is most often financial gain, but “hacktivism” is also becoming a growing threat to nations and organizations that don’t sympathize with the hacker’s cause.

Knowing what’s myth and what’s fact is essential to avoid running unnecessary risks to your business. SMS Passcode have created an infographic and short video that capture the key facts from the latest research about the threat companies face from hacks.

Additional Resources:

The Leap to Token Free; Key Features of Multi-Factor Authentication Solution SMS Passcode

[vimeo vimeo.com/http://vimeo.com/89103575]

In this short video blog Technology Specialist Malcolm Orekoya talks us through the key features of multi-factor authentication solution SMS Passcode – including why choose multi-factor? Why multi-factor offers a more secure alternative to traditional tokens and why password delivery is so secure with SMS Passcode.

SMS Passcode: The leap to token-free; what to consider when evaluating multi-factor authentication

[vimeo vimeo.com/http://vimeo.com/87760650]

With the rise in systems being breached and major brands such as Target, LivingSocial & The New York Times falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?

Webinar Recording: The leap to token free; what to consider when evaluating multi-factor authentication

[vimeo vimeo.com/http://vimeo.com/75018750]

With the rise in systems being breached and major brands such as The New York Times, Ubisoft, Burger King and Virgin Radio falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?

Webinar Recording: SMS Passcode – Next Generation 2 Factor Authentication

[vimeo vimeo.com/http://vimeo.com/62704206]

Recently there has been an explosion in security breaches including attacks on high profile organisations like Sony & Citibank. Increasingly trusted 20+ year old token technology has been breached. View our 30 minute webinar and we will show you SMS Passcode a new generation of login security based on multi-factor authentication via the mobile phone SMS network, voice call or secure e-mail. SMS Passcode is a low cost solution to traditional tokens with maximum scalability, reliability, fast set up and installation.