Worried about black hat hackers getting into your business? Are you aware that almost all electrical devices could be hacked if not correctly designed and developed?
Traditionally, most hackers targeted Windows operating systems, due to there mass market share and the fact they were naturally unsecure and vulnerable to malicious software. However in todays world security experts are seeing a increase in serious attacks on smart phone, tablets and websites.
Attacks on websites can come in many forms such as changing the content of the website (aka defacing). However such vulnerabilities can lead to more serious intrusion on business databases, which can contain user, bank and credit card information. Furthermore, they may gain access to the website server administration account, which may allow them to install a "worm", which will automatically try to get further into your network and all its electronic devices (e.g. computers, smart phones and tablets), for more information gathering and malicious use for personal and/or financial gain.
Penetration testing can come in many forms such as external penetration testing (i.e. from a remote location) or internal penetration testing (i.e. assuming a hacker has gained physical access to the electronic device). This testing involves finding the weak points in a business, which can be caused by poorly written software, network holes, or simply a staff member being tricked into given vital information (via "social engineering" techniques). For example: One of the most forgotten holes is humans! A hacker could simply leave a USB thumbdisk infected with a worm virus out the front of the building, which a employee may pick up and plug into there work computer, thinking they have a free USB thumbdisk.
Contact us today to discuss your security needs, such as an external audit.
The CTO of ColeTEK (Luke Cole) was contracted to crack into a volunteers wireless router, for Channel Nine News: