Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Preparing for Ransomware

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

What Devices Are Under Attack?

Facebook
LinkedIn
X
Pinterest
Desktop computer, laptop computer, and tablet sitting on a desk

We’re used to thinking of computers as being under almost constant attack. But in our day, we have to get used to thinking of all sorts of things being internet enabled, and therefore valid targets for an attacker. The term ‘Internet of Things’ (IoT) refers to all the various devices that we’ve got attached to our network. Unfortunately, too often we fail to think about these devices as computers.

For example, we’d all probably think of these devices as computers —

  • Laptops
  • Desktops
  • Servers

And many of us would add our mobile devices —

  • Tablets
  • Cell phones

But there are even more devices in our office that are really ‘computers’ and can be hacked —

  • Copiers
  • Printers
  • Routers
  • Firewalls
  • Switches

If we’re running an operational network, the list grows even more (and there are many beyond what I’ve listed here) —

  • Control units
  • RTUs
  • HVAC controllers
  • Door controllers
  • Camera network
  • Cellular modems
  • Remote access devices
  • Specialized equipment
  • Traffic signals
  • Medical devices

Even in our homes, we have lots of potential targets that may be internet enabled or networked —

  • Smart television
  • Thermostats
  • Baby monitor
  • Garage door opener
  • Refrigerator
  • Washer & Dryer
  • Door locks
  • Security system
  • Toaster (yes, I saw an internet enabled toaster!)
  • Car
  • And many more items!

Well, you get the idea. If you have an electronic device that either has an IP address or somehow communicates with another electronic device, then you have something that can potentially be hacked. And if it can potentially be hacked, then it has to be secured.

 

Practical Cybersecurity Webinar Series

Learn practical information your business or organization can put to use to improve your cybersecurity stance with the short, monthly webinars.

  • Preparing for Ransomware
  • What’s a Firewall? Why Does It Matter?
  • Why Do We Need MFA?
  • What Does Cyber Insurance Expect of Me?
  • What Happens If My Laptop or Phone Is Stolen?
  • Backup Planning

Registration is FREE!

Facebook
Twitter
LinkedIn
Pinterest
Email
Print

You might also be interested in...