Hacking People While Walking Around in Public

SamvelGevorgyan-382x382.jpg
Samvel Gevorgyan
CEO, CYBER GATES
I cover cybercrime, privacy and security in digital form.

Pwnie Express released its yearly industry report: Internet of Evil Things, providing insight on products that the IT professionals should be wary of.

According to Pwnie Express research:

Note: this report’s findings were culled from more than 800 IT security professionals and on-the-ground data from Pwnie Express sensors monitoring real life wired, wireless, IoT, and BYOD device data, and expert analysis from the Pwnie Express team of InfoSec professionals.

Protect Yourself from Internet of Evil Things

Turn your WiFi Off

Turn off Wi-Fi devices when you are not using them, especially on the weekends — it saves energy and minimizes your exposure to hackers.

Disable unused features

Once the product is in your office, turn off the functions you aren't using. Enabled functionality usually comes with increased security risks.

Note: Also, make sure you review the products before you bring them into the workplace. If it is already there, do not be shy about calling customer service and walking through the steps required to shut down any unused functions.

Change Your Passwords

It is important never to use the default credentials. Set up strong, secure passwords to secure your devices.

Research Your Purchase

Before you even buy a product, always research what you're buying and make sure you know how to update any software associated with that device.

Note: Look for devices, systems, and services that make it easy to upgrade the device and inform the end user when updates are available.

Trust and Verify Every Device

Be aware of any device from brands known to have more security issues than others. The personalization (vendor, firmware) of corporate hardware, including mobile hotspot vendors, is one of the top threats to network security.

References

Topics

Tags

Share this article

Comments ()

Recommended articles

2017/04/apple-fbi-514451372.jpg

Hackers behind iPhone ransom attacks arrested in the UK

2017/02/cloudflare.jpg

Cloudflare exposes sensitive data from millions websites

2017/03/hackers-we-will-remotely-wipe-iphones-unless-apple-pays-ransom.jpg

200 Million iPhones will be wiped remotely

how-to-create-strong-password-610x359.jpg

Common-sense Guidelines for a Good Password Hygiene

infosec_boss_employee_office.jpg

Your boss may read your messages

hello-kitty-610x381.jpg

Hello Kitty hacked with the data of 3.3m users