IT: In the know
Passwords to your Internet of Things (IoT) devices are just a search away
Many devices you get at the store or through a vendor come with a default username and password. Believe it or not, many people do not change the default settings once the IoT device is installed. It is extremely easy to find default credentials for common devices such as IP cameras, printers, routers/modems, database portals, and more.
Manufacturers will actually post the default credentials for their products and can easily be looked up. That is why it is important to always change the default username and password.
The most valuable asset in today’s modern era is data
It is said that data is now one of the most valuable and important assets an association has. Not too long ago, data was mostly stored physically in filing cabinets, local office servers and the like. In today’s world, everything is digital and connected through the Internet. People connect and upload their information on social media. Businesses store their client data on cloud servers to access them anywhere at any time. Transactions and purchases are now largely done over the internet. All of these things further emphasize that protecting your data is critical now more than ever especially since it is more easily accessible. Having the right systems in place to protect, control, and secure your data is crucial.
Cloud data is stored in physical locations
There are several misconceptions when it comes to cloud storage. “The cloud” is not some mysterious entity that is up in cyberspace- it has to exist somewhere. Cloud data is actually stored in physical locations all over the world. These server farms run 24/7/365 and users do not know their whereabouts.
The cloud was designed to be a virtual infrastructure that allows you to access your information over the Internet. This creative engineering is beneficial because it allows users to access their work or school data anywhere through the Internet with any smart device.
Mac computers aren’t immune to viruses
It is true that Mac devices are not largely known for getting viruses, however, there is a common myth about Mac’s being immune to viruses. The answer is, they are not. Viruses are written for specific platforms. Since the majority of computer users and businesses have Windows systems, hackers are going to target them.
Cybercriminals will still create viruses for Mac devices so don’t think you’re in the clear just because they are less targeted! All devices are going to have vulnerabilities, thus both Mac and Windows systems should be protected against security threats.
What are examples of Smart Devices?
Smart technology are devices that are connected over the internet that can be managed. Within the past few years, the number of smart devices has soared. Devices that were never managed or connected over the Internet are now controlled over an app or a portal through the Internet.
Some Smart Devices
Large companies that have been hacked
Throughout the last few years, there has been an uptick in cyberattacks on large corporations. These companies listed below have been breached at least once.
What happens when a company gets breached and your information is exposed? More than likely your information will be put on the dark web for people to purchase. Once they purchase say your Yahoo credentials, that individual will try to gain access to your account and will attempt to use those creds to login to your other accounts like LinkedIn, Facebook, or your credit card account. Since many people use the same password, cybercriminals could quickly wreak havoc all over. That is why it is important to use strong, unique passwords and enable multi-factor authentication wherever possible.