function remove_hello_elementor_description_meta_tag() { remove_action( 'wp_head', 'hello_elementor_add_description_meta_tag' ); } add_action( 'after_setup_theme', 'remove_hello_elementor_description_meta_tag' );
Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Intro to Microsoft Copilot

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

What Devices Are Under Attack?

Facebook
LinkedIn
X
Pinterest
Desktop computer, laptop computer, and tablet sitting on a desk

Table of Contents

We’re used to thinking of computers as being under almost constant attack. But in our day, we have to get used to thinking of all sorts of things being internet enabled, and therefore valid targets for an attacker. The term ‘Internet of Things’ (IoT) refers to all the various devices that we’ve got attached to our network. Unfortunately, too often we fail to think about these devices as computers.

For example, we’d all probably think of these devices as computers —

  • Laptops
  • Desktops
  • Servers

And many of us would add our mobile devices —

  • Tablets
  • Cell phones

But there are even more devices in our office that are really ‘computers’ and can be hacked —

  • Copiers
  • Printers
  • Routers
  • Firewalls
  • Switches

If we’re running an operational network, the list grows even more (and there are many beyond what I’ve listed here) —

  • Control units
  • RTUs
  • HVAC controllers
  • Door controllers
  • Camera network
  • Cellular modems
  • Remote access devices
  • Specialized equipment
  • Traffic signals
  • Medical devices

Even in our homes, we have lots of potential targets that may be internet enabled or networked —

  • Smart television
  • Thermostats
  • Baby monitor
  • Garage door opener
  • Refrigerator
  • Washer & Dryer
  • Door locks
  • Security system
  • Toaster (yes, I saw an internet enabled toaster!)
  • Car
  • And many more items!

Well, you get the idea. If you have an electronic device that either has an IP address or somehow communicates with another electronic device, then you have something that can potentially be hacked. And if it can potentially be hacked, then it has to be secured.

 

Practical Cybersecurity Webinars:
Series 2 Starts November 14, 2024!

Learn practical information your business or organization can put to use to improve your cybersecurity stance with the short, monthly webinars.

  • Preparing for Insider Threats
  • Easy Policy Management
  • Intro to Microsoft Copilot
  • What’s Included with Microsoft 365
  • Get Ready for Windows 11
  • Getting Your “Digital Clouds” Under Control

Registration is FREE!

Facebook
X
LinkedIn
Pinterest
Email
Print

You might also be interested in...