You might have seen recently the case of a Ring Camera system being hacked and someone spying on a young child in their home.
This was picked up the media and the video went viral.
The method the hacker used to access this camera is the same method that could be used to hack your company’s network.
We are going to outline the risk and what you can do to protect your company’s systems and data.
More than likely the hacker had access to a list of compromised accounts, and it was just a case of going through the list to find an account that logged in.
These compromised accounts are made publicly available and are usually generated when there’s a data breach at a large orginisation.
Perfect examples of recent breaches are:
All have been breached and customer login details acquired.
Most users will use their email and the same password for online services. Once a hacker has a list of these accounts, it’s just a case of attempting to access your system using a password that has been published in a data breach.
There are two main areas of defense to stop these types of attacks happening to your network:
1) Use a password manager.
Password managers allow you to store all passwords to sites & services in an encrypted software tool.
The password manager will auto-generate passwords for your accounts and no two passwords are the same.
2) Keep an eye on your email
Our free to use tool allows you to enter both your work and personal email address into the search.
The tool will alert you to any breaches that may contain your email, and more importantly, passwords.
We advise that you regularly check your email addresses and change passwords on any accounts that may use the password that has been published.
Finally, we encourage you to share this tool with your business associates, clients and colleagues.