ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Lessons Taken Right From the Hacker’s Playbook

Security Lessons Taken Right From the Hacker’s Playbook

As we hear news about large-scale hacks and data breaches, there’s a temptation to picture attacks like those in television shows and films like Mr. Robot, Live Free or Die Hard and other works of fiction. These attacks are often carried out by criminal geniuses or nefarious nation-states, utilizing of a crippling zero-day vulnerability or superbug to bring society to its knees.

While such stories can make for great entertainment, is this trend toward huge, sophisticated hacks in fiction representative of real life? As it turns out, apparently not.

Penetration company SafeBreach released the second edition of their Hacker’s Playbook, which describes the experience the company’s researchers had as they simulated almost four million methods of data breaches between January and September of 2016. Those that succeeded were analyzed to establish how the hacker entered the system, how they moved about the system, and how they stole data away.

The results were surprising, to say the least. The most successful attacks that were run were those that have been around for years. The old “.exe file in the email attachment” trick was effective in a quarter of all attempts that were tested, and assorted malware-distributing exploit kits and zip files tested to be very effective as well. In short, the vast majority of vulnerabilities came--not from the cinematic doomsday plots of superbug-wielding geniuses--but from the old, tried-and-true issues and user errors. Oftentimes, measures meant to stop malware aren’t configured properly, leaving a system exposed and underprotected.

So what does this mean for your business?

Quite a bit, actually. Reflecting upon such trends, it is essentially guaranteed that a hacker could make off with whatever data they could want. However, businesses can still take preventative measures against this by implementing the proper solutions (like firewalls and spam blocking tools), educating their employees as to the threats that are out there, and properly maintaining their systems.

For assistance with any and all of these goals, reach out to ClearView IT. With our experience with network security and fulfilling other IT needs, we can provide you with a solution that best fits your company’s goals. Call 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Small Business Upgrade Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Apps Managed Service IT Support Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Gadgets Information Bandwidth Remote Encryption Mobile Device Management Server App WiFi Virtualization Blockchain Spam Business Technology History Budget Employee/Employer Relationship Gmail Apple Office Two-factor Authentication Information Technology Office 365 Wi-Fi Cybercrime Health Analytics Access Control Big Data Data Security BDR Conferencing IT Management Employer-Employee Relationship Training Compliance Vendor Remote Computing Voice over Internet Protocol Help Desk Cost Management Hacking Patch Management Document Management Remote Monitoring Hacker Save Money Firewall Best Practice Retail Augmented Reality Applications BYOD Word Alert IBM Computing Vulnerabilities Hiring/Firing Website Vendor Management Hard Drive Outlook Password Mobile Office Managed Services Legal Data loss Project Management Data storage Money Customer Service Search... Unified Threat Management Black Market Data Breach Google Maps Storage Cleaning Scam iPhone Robot Education Cortana Content Filtering VPN Windows 11 User Monitoring Update Router Healthcare Remote Workers Twitter The Internet of Things YouTube Chrome Windows 7 Paperless Office Law Enforcement Antivirus Free Resource End of Support Maintenance Printer Laptop How To Mobile Computing Websites Marketing Travel Virtual Reality Mobility Running Cable Meetings Sports Social Engineering Social Cryptocurrency SaaS DDoS Avoiding Downtime Holidays Processor Disaster Politics Cooperation Machine Learning Settings Video Conferencing Lithium-ion battery Virtual Machines Solid State Drive Tech Terms Computer Repair HIPAA Managed IT Multi-factor Authentication Digital Professional Services Processors Chromebook Drones Taxes Automobile Saving Time Managed Services Provider Computers Bitcoin How To Microchip Virtual Private Network Flexibility Telephone Physical Security Wireless Technology eWaste Current Events PowerPoint Administration Identity Theft Excel Solutions Hack Notifications Presentation Downtime Unified Communications Start Menu Specifications Safety Images 101 Downloads IT Consultant Integration Computer Care Google Docs Display Virtual Desktop Bluetooth Vulnerability Virtual Assistant Customer Relationship Management Experience Distributed Denial of Service Co-Managed IT Office Tips Software as a Service Data Protection Entertainment Private Cloud Memory Employees Videos Google Calendar Database Surveillance Supercomputer Staffing Botnet IP Address Rental Service Micrsooft Virus Managing Costs Equifax SSID Motion Sickness Flash Health IT Telephone Systems Media Comparison Business Growth Tactics Development Google Drive Hard Drive Disposal Employer/Employee Relationships Username Virtual Machine Startup Optimization Corporate Profile Freedom of Information Smart Technology Reviews Knowledge Competition Banking Navigation 2FA Television Google Wallet Addiction Telephony email scam Teamwork Employer Employee Relationship Recovery Troubleshooting Messenger Deep Learning Data Storage Mobile Security Hypervisor Cabling Legislation Tablet LiFi News Medical IT G Suite Entrepreneur User Tip Shopping Application Business Metrics Evernote Paperless Mouse Hosted Solution Network Management VoIP SQL Server Tracking Documents Books Business Intelligence PCI DSS Licensing Society Emails Humor Fake News Supply Chain Web Server Language Proxy Server Gig Economy Business Communications SharePoint Service Level Agreement Internet Service Provider Computing Infrastructure Azure Digital Payment Securty Business Owner Domains Reading Monitors Management Regulations Compliance Visible Light Communication Device security Managed IT Service Worker Windows 8 Wireless Headphones Memes Access Microsoft Excel Workplace Tech Human Resources Going Green Net Neutrality Time Management Business Cards Public Cloud Relocation Displays Error Financial Data Advertising Audit Tech Support IT Spyware Scams Work/Life Balance Bookmark Risk Management Public Speaking Term Google Apps Download Piracy File Sharing Inbound Marketing Streaming Media Telework Redundancy HTML Browsers Smartwatch Nanotechnology Communitications Cache Microsoft 365 Cables In Internet of Things Keyboard Hard Drives Hacks Google Play Network Congestion Upload Procurement Unified Threat Management Software License Workers Reliable Computing intranet Writing Social Network FinTech Data Analysis CES Printing Screen Reader IT Assessment Electronic Payment Point of Sale CCTV Wireless Shortcut Heating/Cooling Security Cameras Environment Trends Supply Chain Management Touchscreen Mobile Technology Value Devices Cyber security Windows XP Shortcuts Computer Malfunction Scalability Social Networking Customer Resource management Organization Emergency Text Messaging Fileless Malware Proactive IT Smart Devices Vendor Mangement Tip of the week Phone System Administrator Bring Your Own Device Gamification Remote Working Company Culture Samsung Regulations Trend Micro Uninterrupted Power Supply Be Proactive Webcam Telephone System AI Directions Digital Security Cameras Music Backup and Disaster Recovery Electronic Health Records Business Mangement Transportation Content Desktop Wasting Time Tablets Accountants eCommerce Modem Workplace Strategies Computer Accessories Electronic Medical Records

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?