Busting The Top Four Myths About Hacking

By Torben Andersen, CCO, SMS PASSCODE

Are you protecting your data with just a password? If your answer is no, and you have strong multi-factor authentication in place, then good job: you are free to go out and enjoy the sunshine. If you answered yes, then stick around for a few more minutes to learn why a password alone is not enough to secure access to your corporate networks and applications.

Still here? Okay then, allow me to start by busting some of the typical myths about hacking today.

1# Myth – Hackers only target the big brands
blog-image-1

When big brands like Target, eBay, Adobe, and Sony are hacked, it’s big news for business and mainstream publications. Don’t be fooled: big companies aren’t the only ones being targeted. In fact, research shows that 31 percent of all hacking attacks were aimed at businesses with fewer than 250 employees.

2# Myth – You have nothing valuable for hackers to steal

blog image 2.jpgFair enough. Not everyone is fortunate enough to be storing breakthrough research with the potential to revolutionize your industrythe world if only you can keep it secret long enough to secure a patent. But what about your business email? Email often contains highly sensitive data, such as competitive bids, investment plans or pipeline information. Imagine the damage if these details were to fall into the wrong hands.

There’s even more low-hanging fruit to steal if hackers breach your network. Customer records, credit card information and even employee user credentials are worth as much as $50 USD per record when sold on the Internet. An entire shadow economy has emerged online with brokers selling stolen user records; according to the FBI, cybercrime has become even more profitable than drug-related crimes. This makes everyone a target.

3# Myth – Your anti-virus and network vulnerability tests will keep you safe

blog-image-3Patch management, updated anti-virus applications and frequent network vulnerability tests are all good weapons in a defense against hackers. However if you are not securely authenticating your users when they access your corporate networks or applications, then you’re leaving the front door open for the hackers. Research shows that weak or stolen passwords are exploited in 76 percent of all network breaches. So, yes, this really is the hackers’ preferred way in.

4# Myth – Hackers are teenagers lurking in a basement somewhere

For most of us, the word “hacker” prompts images of pale teenage boys with long hair, black t-shirts and a serious grudge against Microsoft. While many hackers probably still fit this description, the reality is that the hacker has evolved. Today’s hacker is highly-educated, well-connected, and well-equipped, enjoying a high-income profession as a professional cybercriminal. The hackers have some powerful tools at their disposal, and many poorly-protected victims has made hacking easier than ever before, resulting in cybercrime becoming the fastest growing crime type in the world.

Hackers’ motive is most often financial gain, but “hacktivism” is also becoming a growing threat to nations and organizations that don’t sympathize with the hacker’s cause.

Knowing what’s myth and what’s fact is essential to avoid running unnecessary risks to your business. SMS Passcode have created an infographic and short video that capture the key facts from the latest research about the threat companies face from hacks.

Additional Resources:

Make your summer stress free with Password Reset

By Vanessa Cardwell, Marketing Manager, Netutils.

Views expressed in this post are original thoughts posted by Vanessa Cardwell, Marketing Manager, Netutils. These views are her own and in no way do they represent the views of the company.

Our guess is that a number of your employees are returning from their summer holidays and can’t remember their passwords. Are we right? It’s confession time from me .. I had to think hard to remember mine!

Drink by the CaribbeanStatistics suggest that as much as 20-50% of all help desk calls are related to password problems, and the scenario with forgotten passwords after a holiday is classic and a real pain to many IT departments.

SMS PASSCODE’s Password Reset Module takes this pain away by enabling users to easily reset their own Active Directory passwords in a secure way. The solution offers automated user notification and places intuitive self-service capabilities in the hands of the user. Take a look at this video from SMS Passcode for an quick overview of how it works.

(Btw, I did remember mine in the end, in case you were wondering!)

[vimeo vimeo.com/http://vimeo.com/100687647]

 

 

 

The Leap to Token Free; Key Features of Multi-Factor Authentication Solution SMS Passcode

[vimeo vimeo.com/http://vimeo.com/89103575]

In this short video blog Technology Specialist Malcolm Orekoya talks us through the key features of multi-factor authentication solution SMS Passcode – including why choose multi-factor? Why multi-factor offers a more secure alternative to traditional tokens and why password delivery is so secure with SMS Passcode.

SMS Passcode: The leap to token-free; what to consider when evaluating multi-factor authentication

[vimeo vimeo.com/http://vimeo.com/87760650]

With the rise in systems being breached and major brands such as Target, LivingSocial & The New York Times falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?

Webinar Recording: The leap to token free; what to consider when evaluating multi-factor authentication

[vimeo vimeo.com/http://vimeo.com/75018750]

With the rise in systems being breached and major brands such as The New York Times, Ubisoft, Burger King and Virgin Radio falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?

Webinar Recording: SMS Passcode – Next Generation 2 Factor Authentication

[vimeo vimeo.com/http://vimeo.com/62704206]

Recently there has been an explosion in security breaches including attacks on high profile organisations like Sony & Citibank. Increasingly trusted 20+ year old token technology has been breached. View our 30 minute webinar and we will show you SMS Passcode a new generation of login security based on multi-factor authentication via the mobile phone SMS network, voice call or secure e-mail. SMS Passcode is a low cost solution to traditional tokens with maximum scalability, reliability, fast set up and installation.

SMS PASSCODE® Version 6.1 raises the bar with location and behaviour aware login security

In this video blog our Senior Technical Consultant, Malcolm Orekoya, takes us through the new features of SMS PASSCODE® version 6.1 . Location and behaviour aware login security protects your remote access systems and users against un-authorised access.

[vimeo vimeo.com/49157381]

VMware to demonstrate SMS PASSCODE configuration as part of bootcamp

You may be interested in the recent blog post from Lars Nielsen, VP Commercial Operations at SMS Passcode.

During the recent VMware View Bootcamp – Mobile Secure Desktop: Radius 2-Factor Authentication – Mark Benson from VMware did an excellent walk through of the recently announced RADIUS support in the VMware View VDI client. SMS Passcode have been a technology collaboration partner on this project. Mark walks through the specific setup required to implement SMS PASSCODE transparently with the View client. It is an excellent brief tutorial on how easy it is to protect View with the more secure real-time, session specific multi- and two-factor authentication from SMS PASSCODE following a demonstration of a legacy token solution.  To learn more, visit the Youtube video here.

For more on SMS Passcode please follow their blog. http://blog.smspasscode.com/

Modern Threats, Modern Solutions – New Generation 2 Factor Authentication

View our latest Netutils Tech Round Up, here we discuss multi-factor authentication. Our Network & Security Specialist, Malcolm Orekoya illustrates how with security breaches at historically high levels a user name and password alone is simply not enough to protect your network. SMS Passcode offers a low cost solution to traditional tokens with maximum scalability, reliability, fast set up and installation.

Computer Scientists Break Security hardware Token Key in Record Time

According to a recent New York Times post, computer experts claim to have found an easy way to hack into a certain RSA token that has a USB port and compromise the seed-file. Essentially, tokens physical or software based, all hold a seed file that tells what code to show in which token at what time. These are all commonly known as pre-issued token systems.  Without arguing or validating the news, the latest story posted in the New York Times blog, illustrates the challenges this widely used approach has when it comes to the modern threats of today. The best solution is to focus on real-time session specific solutions that do not contain seed files or pre-issued codes. Be it delivered via SMS or software or hardware tokens. The SMS PASSCODE solution is one such solution where the user ID and password is validated before a code is generated in real-time and delivered via SMS, voice or secure email to the users mobile device. No seed-file, no pre-issued codes. The solution is highly awarded due to this simple, yet profound difference. To learn more about the New York Times post, click here.

You may be interested in attending our latest Webinar: Modern Threats, Modern Solutions – New Generation 2 Factor Authentication. Register here.