Product Information by Beth Watts Oct 26, 2016 Think Like the Bad Guys - How to Spot Network Vulnerabilities Around this time of year, I love listening to mystery podcasts to prep myself for Halloween. There is something eery about the “whodunit” genre that gets you identifying with the victims and wondering what you could have done to prevent the various scary situations. Majority of the time, the resolution is to “think like the bad guys.” In true Sherlock Holmes style, applying attention to detail while putting yourself in the shoes of the hacker helps prevent bad things from happening. Coincidentally, this strategy is particularly applicable to apply to your business’ network security. To stay ahead of hacking, you need to think like a hacker. Try to Hack Your Network If the goal of a hacker is to connect to your business’ network through unsecure Wi-Fi and download data from your file - would he or she be able to? Is your network “door” open to cyber intruders who can access your system? Here are a couple of situations that are part of a penetration test, a systematic method of evaluating a network for common weaknesses. Jungle Disk offers a free Shield Test comprised of seven facets of network security, including: Open Ports Test DDoS Defense Test Malware/Virus Test Client-side Attack Server-side Attack Credit Card Theft Test Bandwidth Test Other free tools include Nmap (featured in the Matrix Reloaded and Die Hard 4), Browserscope and PCFlank. Determine What to Defend If you were trying to get into a fortress, what would you do first? Probably evaluate the perimeter and see if there are any unguarded areas. The logic still applies in the cyber realm - take an inventory of all PC’s, servers, mobile devices, firewalls and switches that are on your network. A weakness in any of these areas could be a targeted vulnerability. Identify Weaknesses and Correct Them After you have thought about your potential vulnerabilities, threats and defenses, be sure to create an action plan. Training employees on password hygiene is a quick and easy first step. To take your protection to the next level, purchasing security software and hardware is the next step, however, it requires budgeting and resources. Jungle Disk Network Threat Protection is a cost-efficient solution for small to medium businesses not interested in purchasing expensive hardware. It’s always a difficult pill to swallow discovering that your business’ data may have been at risk without even knowing it. Remember, it’s worth thinking like the “bad guys” if you can keep your network safe from cyberattacks!