Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? Total Tech Care can help. To learn more, reach out to us at 866-348-2602.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Cloud Best Practices Privacy Technology Backup Hackers Hosted Solutions Microsoft Business Computing Business Google Productivity Malware Software Disaster Recovery Business Continuity Network Security Efficiency Windows 10 Mobile Devices Email Internet VoIP Browser Smartphones Data Innovation Android Hardware Computer Miscellaneous Office Workplace Tips IT Services communications Smartphone Upgrade Managed IT Services Virtualization Computers Network Outsourced IT Business Management IT Support Server User Tips Hacking Chrome Telephone Systems Save Money Managed Service Provider Cybercrime Windows Alert Small Business Holiday Social Media Ransomware Recovery Employer-Employee Relationship Social Engineering Microsoft Office App Automation Application Mobile Device Management Operating System Quick Tips Mobility Money Marketing Data Backup Passwords Mobile Computing Office Tips Communication BYOD Information Technology How To Productivity Collaboration Law Enforcement Health Work/Life Balance Flexibility Password Office 365 IT solutions Facebook Budget Saving Money Bandwidth Networking Avoiding Downtime Cloud Computing Two-factor Authentication Remote Computing Private Cloud Cybersecurity HaaS Remote Monitoring Spam Bring Your Own Device Managed IT Services Wi-Fi Data Breach User Error Windows 10 Entertainment History Website Safety The Internet of Things Google Drive Lithium-ion battery Gmail Redundancy Router VPN BDR Big Data Data Recovery Mouse Managed IT Artificial Intelligence Data Management Computing Infrastructure Cleaning Computer Accessories Retail Hard Drives Apps Meetings Instant Messaging Excel Wearable Technology Unsupported Software Robot WiFi Battery Biometrics Charger Hacker End of Support Shadow IT Bluetooth Risk Management Physical Security OneNote Computer Care Data Security Training Internet Exlporer USB Applications Wireless Samsung DDoS IT Consultant Value Keyboard Word Settings Spam Blocking Environment Humor Government Best Practice Phishing Fax Server Black Market Hiring/Firing Firewall Virtual Reality Data Storage Wireless Technology SaaS Solid State Drive Network Congestion Downtime Vulnerability Save Time Apple Gadgets Patch Management Data storage Worker Automobile IT Management Scam Virus Unified Threat Management IT Plan Social Networking Password Manager Sync Going Green Workers Transportation Managing Stress Reputation FENG Credit Cards Streaming Media Vendor Management IBM Content Tech Support Cameras Telephony Laptop Memory Voice over Internet Protocol Benefits Techology Customers Fraud Supercomputer Audiobook Running Cable Software Tips Virtual Desktop Printer Skype Touchpad Emails Multi-Factor Security Smart Technology Legal Education Amazon Encryption Current Events Science Politics Advertising Printer Server Start Menu Netflix Trending Two Factor Authentication Mobile Device Root Cause Analysis Amazon Web Services Notifications Knowledge Experience HIPAA PDF HBO Customer Relationship Management Sports Tools Analyitcs Comparison Users SharePoint Relocation Data loss Programming Online Shopping Leadership Music Distributed Denial of Service Outlook Customer Service Proactive IT Video Games Specifications Electronic Medical Records Worker Commute Screen Mirroring Evernote Loyalty YouTube Windows 8 Troubleshooting Frequently Asked Questions Scalability Botnet IT service Windows 10s Millennials Business Owner Antivirus Cast Wireless Charging Human Resources Tip of the week NarrowBand webinar Tablet Books Consultant Search Analytics Travel Domains Internet of Things Public Cloud Workforce Employer Employee Relationship Assessment Document Management iPhone Cortana Windows Server 2008 Maintenance Conferencing Emergency Best Available How to Bloatware Telecommuting WIndows 7 Television Files Business Intelligence Social Google Apps Windows 7 Chromecast IT Support Tablets IaaS Update People Audit Entrepreneur Remote Work Public Computer eWaste Colocation Infrastructure Uninterrupted Power Supply Flash Shortcut User PowerPoint Google Docs Mobile Office Monitor Windows Media Player Computer Fan Cost Management Identity Theft Rootkit

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...