Smartphones, computers, tablets….

Technology, according to Moore’s law will get faster, and smaller as time goes by. I am paraphrasing here in order to make the point. Years ago, cell phones were just that, phones. They had a small LCD screen, and they could make and receive phone calls. Some even had an address book that could store up to 1000 names and numbers! Today, the technology packed in to a high end iPhone or Android device is greater than that of computers from 10 years ago. The younger generations can’t live without their smart phone and in some cases conduct their whole live on a 3″x4″ screen.

With IoT devices in almost every home (think about smart devices in your home/business, such as a Ring Doorbell, a video camera, a smoke detector, a WiFi capable refrigerator, thermostat, you get the idea), your home or business is connected to everything. This includes the smart phones and tablets. The risk here is that these IoT devices and smart phones are the greatest attack surface of any hacker.

So what does this mean? Computer networks will always be a vector for bad actors, but there are new threats emerging that go after these pervasive devices. How does this work? Let’s see…

Let’s say you have Facebook on your smart phone, and you see a message from an old high school friend whom you haven’t spoken to in 20 years asking you to click on a link, or watch a video. You are on your phone, so it’s safe, right? Wrong.

You open the link and in the background malware downloads to your phone. Immediately you phone reaches out across the wifi network you are connected to in order to discover other devices on your network. Are you at work? You business is now at risk! Your IoT security cameras? Compromised. Your network is being attacked.

Want to know how to mitigate this risk? Contact us today!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: