Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? Total Tech Care can help. To learn more, reach out to us at 866-348-2602.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 July 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Backup Hackers Business Computing Hosted Solutions Malware Microsoft Google Business Software Network Security Productivity Efficiency Internet Disaster Recovery Mobile Devices Business Continuity Email Windows 10 VoIP Innovation Browser Data Android Computer Workplace Tips Smartphones IT Services Smartphone Hardware communications Miscellaneous Office Network Upgrade Virtualization Computers Cybercrime User Tips Managed IT Services Business Management IT Support Server Save Money Hacking Chrome Outsourced IT Windows Managed Service Provider Telephone Systems Microsoft Office Tech Term Ransomware Alert Social Engineering Automation Social Media Recovery Employer-Employee Relationship Small Business Holiday Mobile Device Management Cloud Computing App Money Communication Operating System Mobility Data Backup Collaboration Law Enforcement Productivity BYOD Quick Tips Application Office 365 Password Cybersecurity Office Tips Passwords Facebook Information Technology VPN Router Marketing Health Mobile Computing How To Internet of Things Saving Money Remote Monitoring Bandwidth Networking Artificial Intelligence Work/Life Balance Data Recovery Big Data Managed IT Services Gmail Applications Flexibility Two-factor Authentication Avoiding Downtime IT solutions Remote Computing Entertainment BDR Website Budget Private Cloud Spam Managed IT HaaS Bring Your Own Device Wi-Fi Data Management Cleaning Vulnerability Apps History Connectivity The Internet of Things Lithium-ion battery Data Breach Safety Google Drive Redundancy Windows 10 Data Security Mouse USB Data Protection Phishing Word User Error Blockchain Computing Infrastructure Biometrics Hacker Business Intelligence Windows 7 IT Support Patch Management Risk Management Worker Battery Training IT Management End of Support Scam Shadow IT Wireless Update Legal DDoS Physical Security Encryption IT Plan Internet Exlporer Virus Mobile Device Unsupported Software Infrastructure Environment HIPAA PDF Settings Sports Charger Computer Accessories Identity Theft Fax Server Keyboard Computer Care Human Resources OneNote WiFi Firewall Government Best Practice YouTube Virtual Reality Samsung Black Market Bluetooth SaaS Network Congestion Value Apple Document Management Wireless Technology Spam Blocking Solid State Drive Electronic Medical Records eWaste Downtime CES IT Consultant Save Time Gadgets Comparison Hiring/Firing Data storage Paperless Office Hard Drives Content Management Automobile Humor Retail Meetings Instant Messaging Wearable Technology Robot Excel Data Storage Memory Windows Server 2008 Conferencing Emergency Going Green Travel Nanotechnology Millennials Consultant Television Analytics Running Cable Reputation Virtual Desktop Streaming Media HVAC Wireless Charging Staff Content Tech Support Laptop Audit Workforce Best Available Techology WIndows 7 Public Computer Customers Enterprise Content Management Science Cortana Servers Digital Signature Audiobook Touchpad Devices Computer Fan Telecommuting Rootkit Google Apps Education Customer Relationship Management Password Management Analyitcs Flash Accountants Politics Workers Advertising Transportation SharePoint Programming Thought Leadership FENG Remote Work Vendor Management User IBM PowerPoint Distributed Denial of Service Windows Media Player Customer Service Notifications NIST Sync Google Docs Benefits Unified Threat Management Addiction Software Tips Password Manager Managing Stress Users Supercomputer Relocation Cryptocurrency Windows 8 IT service Proactive IT Telephony Smart Tech Emails Voice over Internet Protocol Smart Technology Video Games Cameras Antivirus Cache Credit Cards Tablet Business Mangement Worker Commute Current Events Safe Mode Domains Skype Practices Netflix Multi-Factor Security Two Factor Authentication Scalability Printer Wireless Internet Root Cause Analysis Fraud HBO Recycling Business Owner Knowledge Experience Maintenance Virtual Assistant NarrowBand Bloatware Start Menu Hosted Computing Trending Search Printer Server Social Wire Data loss Amazon Tablets Outlook Criminal Leadership IaaS iPhone Music Telephone System People Entrepreneur Tools Inventory How to Loyalty Smart Office Screen Mirroring Amazon Web Services Frequently Asked Questions Files Troubleshooting Shortcut Mobile Office Chromecast Cost Management Access Control Windows 10s Social Networking Cast Online Shopping Tip of the week webinar Colocation Books Uninterrupted Power Supply Botnet Authentication Public Cloud Specifications Employer Employee Relationship Assessment Monitor Machine Learning Evernote

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...