Some members of the Hacktivist group Anonymous just released an operating system aimed to easily decipher passwords and hack into corporate networks worldwide. Some members of Anonymous have come out and disowned the software, but just because some hackers are more noble minded doesn’t mean the rest of the bunch are less of a threat.
And hacker’s toolboxes aren’t being limited to software, either. Now, companies like Pwnie Express are building hardware like their Pwn Plug that makes it insanely easy to hack into any network. Designed to look inconspicuous, the Pwn Plug literally plugs into a network and opens the door for whoever put it there to access the network from afar.
Fortunately, it’s fairly simple to stop your network from getting hacked by a Pwn Plug: be wary of who you let in your office. Make sure it’s standard protocol for everybody to check with higher-ups before allowing a contractor to do work. Send out company-wide emails to announce when work is going to be done as the simplest method for hackers to get access is to pose as electricians that are checking the building for power surges.
It should be noted that while the Pwn Plug can be put to nefarious uses, in the right hands it can help secure networks. Along with similar tools, the Pwn Plug can be put into a network by the system’s manager as a tool to find security leaks remotely (which is Pwnie Express’s business, not hacking). This way it becomes a sweet little tool that can save significant time and money as IT technicians can monitor your network’s security from their desk.
WPE vs WPA vs WPA2
Another key to keeping your network safe is to drop WEP (Wired Equivalent Privacy) encryption right now. It literally takes about ten minutes for a twelve-year old without experience with networks to hack. There are even dozens of how-to hack a WEP network guides all over the Internet. You really want WPA2 (Wi-Fi Protected Access) or at least WPA to secure your network. They make your password your weakest point and a good password can take years longer to hack through than it takes us to notice someone is attempting to break in to your network.
A Tech Arms Race
It’s a sad state of affairs, but as hackers gain access to more sophisticated tools to break into networks, it becomes more and more imperative to have IT experts on your side that know how to defend against online attacks. Vulnerability to hackers is one of the fastest ways to turn your technology from an asset into a serious liability.
We are more than happy to give you peace of mind and ensure your business is protected from hackers