To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.
This article is an excerpt from our ebook, Current Hacking Trends. To download your free copy of the complete ebook, click here.
The recent outbreak of highly publicized breaches (we’re looking at you Target and Neiman Marcus processors, merchants, and consumers losing sleep over payment card security.
To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.
Whether it’s to work from home or allow a service provider offsite network access, remote access offers flexibility, convenience, and outsourcing opportunities that benefit many businesses. However, remote access isn’t just convenient for business owners. Virtual Private Network (VPN) and remote access technology can also provide hackers an open door to business systems.
One of the main concerns with remote access is that while you may be able to manage security on one end, there is no guarantee of security on the remote user’s side. Hackers may use a remote user as a Trojan horse to gain access to the business network. This is only one example of the many ways VPN and remote access technology can be used against you.
Did you hear about Buffalo Wild Wings, Taco Bell, and Dairy Queen POS breach that stemmed because of insecure remote access?
See also: SecurityMetrics PCI Guide
As hackers continue to evolve their attack methods, it’s important for businesses to protect against current threats.