Remote backup disaster recovery includes a few different moving pieces. The first is remote backups – this essentially means a company that provides networking services, such as iPoint Technologies, routinely makes copies of your company’s most significant data, and then stores those copies on a server that is located somewhere far away from your office. That way, if a disaster occurs – such as a wildfire, or one of your employees clicks on a suspicious link that downloads a ton of ransomware onto your servers, and suddenly you cannot access any business information unless you pay a huge ransom to strangers over the internet – your company’s information is safe and can be recovered! (Take that, fraudsters!)
iPoint Insights (blog)
Shoddy Wi-Fi Security Leaves Popular Brands Vulnerable to Hackers
Related Insights
Password Security Basics
Not so fun fact: 81% of all data breaches are caused by weak passwords (according to Verizon...
Remote Backup vs On-Site Backup
Backing up your data is more important then ever with increasing hacks and malware it is...
Why Phishing Scams Are Bad & How Not to Bite
We’ve all seen them. From that dashing Nigerian Prince who promises you riches to that text with a...
Reasons to Upgrade to Windows 10
Starting January 14, 2020 Windows 7 will no longer be supported by Microsoft. This means no...
Beware Phishing Scams and How to Keep your Passwords Safe
We have been seeing quite an increase in attempts to obtain sensitive information through email,...
A recent network security study conducted by Independent Security Evaluators (ISE) found that thirteen common home/small business routers contain security holes. They announced that the devices tested could be easily accessed by a hacker if they had access credentials.
The routers chosen for the study include some of the world’s most popular brands- Linksys, Belkin, Netgear, Verizon and D-Link to name a few. Although the latest firmware was used in the study, all devices were configured to the average “out-of-box” settings. ISE stated that users have few options for mitigating attacks, as it requires a level of networking knowledge beyond that of the average consumer. In other words, hackers can intercept traffic on any given network and view the information if it is not encrypted.
Other damaging side-effects can be suffered through breached network security. For instance, ISPs deploying large numbers of vulnerable routers can potentially provide hackers with access into their own core infrastructure. Sniffing and Rerouting of non-SSL traffic, tampering with DNS settings and initiating dispersed denial-of-service attacks are also plausible dangers of hacker intervention.
ISE has advised router manufacturers to upgrade susceptible hardware and contact their registered users with instructions on how to upgrade their network security. iPoint’s iNetwork Monitor works the same way, monitoring for breached security holes, upgrades and functionality constantly on a 24/7/365 basis. Contact our Networking Department today to learn more.