Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? Total Tech Care can help. To learn more, reach out to us at 866-348-2602.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Backup Hosted Solutions Business Computing Malware Microsoft Google Network Security Business Internet Software Productivity Mobile Devices Innovation Disaster Recovery Business Continuity Email Data Workplace Tips Efficiency VoIP Browser IT Services Computer Hardware Windows 10 Smartphones Miscellaneous Android communications Smartphone User Tips Network Tech Term Office Upgrade Server Virtualization Computers Outsourced IT Cybercrime Managed IT Services Business Management Save Money Hacking Chrome Windows IT Support Microsoft Office Communication Telephone Systems Social Media Ransomware Data Backup Alert Managed Service Provider Social Engineering Cloud Computing Automation Recovery Employer-Employee Relationship Small Business Mobile Device Management Holiday Productivity Operating System Mobility Money Passwords App Facebook Data Recovery Applications Mobile Computing Collaboration BYOD Application Law Enforcement Saving Money Internet of Things Quick Tips Artificial Intelligence Password Office 365 Office Tips Cybersecurity Information Technology Marketing Managed IT Services VPN Router Health Windows 10 Bandwidth Networking How To Remote Monitoring Work/Life Balance Big Data Flexibility Gmail IT solutions Entertainment Website Budget Avoiding Downtime Two-factor Authentication BDR Remote Computing Private Cloud Mouse Gadgets Spam Managed IT HaaS Bring Your Own Device Wi-Fi Data Management Phishing Connectivity Cleaning Word Apps History Training Vulnerability Encryption The Internet of Things IT Support Lithium-ion battery Safety Google Drive Scam Sports Redundancy Data Breach Settings Keyboard Firewall USB Data Protection Data Security Information User Error Instant Messaging Computing Infrastructure Meetings Wearable Technology Robot Excel Hiring/Firing Biometrics Hacker Battery Data Storage Virus End of Support Shadow IT Risk Management Infrastructure Legal Unified Threat Management Physical Security Business Intelligence Windows 7 Computer Accessories Patch Management Identity Theft Internet Exlporer Wireless DDoS Worker Mobile Device IT Management HIPAA PDF Update WiFi IT Plan Environment Printer Fraud Fax Server Bluetooth Government Best Practice Unsupported Software Human Resources YouTube Black Market Virtual Assistant Charger Virtual Reality SaaS IT Consultant OneNote Telephone System Computer Care CES Document Management Comparison Network Congestion Wireless Technology Apple Paperless Office Solid State Drive Downtime Humor Samsung Content Management Save Time eWaste Data storage Managed Service Value Blockchain Automobile Spam Blocking Electronic Medical Records Retail Hard Drives Best Available Troubleshooting Workforce Frequently Asked Questions Going Green WIndows 7 Windows 10s Enterprise Content Management Cortana Digital Signature Reputation Streaming Media Cast Augmented Reality Memory webinar Devices Content Books Telecommuting Tech Support Tip of the week Laptop Running Cable Botnet Virtual Desktop Public Cloud Password Management Employer Employee Relationship Google Apps Techology Accountants Customers Remote Worker Assessment Windows Server 2008 Conferencing Thought Leadership Audiobook Emergency Remote Work Touchpad Travel User NIST Science PowerPoint Windows Media Player Television Education Google Docs Wiring Addiction Politics Advertising Customer Relationship Management Managing Stress Audit Cryptocurrency Password Manager Public Computer Smart Tech Voice over Internet Protocol Notifications Camera Analyitcs Servers Programming Cache Cameras Credit Cards SharePoint Distributed Denial of Service Customer Service Computer Fan Safe Mode Rootkit Business Mangement Practices Users Multi-Factor Security Relocation Warranty Flash Workers Wireless Internet Transportation Proactive IT FENG File Sharing Windows 8 Vendor Management Recycling Video Games IBM Hosted Computing Worker Commute Trending IT service Antivirus Sync Wire Printer Server Benefits Amazon Scalability Tablet Criminal Supercomputer Inventory Business Owner Domains Software Tips NarrowBand Telephony Emails Smart Office Smart Technology Amazon Web Services Search Maintenance Bloatware Current Events Access Control iPhone Skype Social Netflix Two Factor Authentication Online Shopping How to IaaS Root Cause Analysis Tablets Entrepreneur Knowledge Authentication Experience Specifications Files People HBO Chromecast Start Menu Machine Learning Evernote Shortcut Data loss Cost Management Consultant Leadership Nanotechnology Music Millennials Colocation Uninterrupted Power Supply Mobile Office Outlook Tools Social Networking HVAC Analytics Wireless Charging Monitor Screen Mirroring MSP Loyalty Staff

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...