Skip to main content
Text saying you have been hacked

The changing landscape of cyber threat

27th June 2024

If you thought that you were on top of your IT security, think again! Your endpoint (Desktop, laptop, etc.) protection may be in good shape but this has only driven malicious actors to find more inventive ways to infiltrate your systems. Did you know, for instance, that there is a route in via your network devices and infrastructure?

There are a number of weak points to be aware of, such as: routers, switches, servers, firewalls, domain name systems, etc.. These devices are ideal targets for malicious cyber actors because most or all organizational and customer traffic must pass through them and once installed, many are not maintained at the same security level as general-purpose desktops and servers.

Here are some reasons why they’re vulnerable:

  • Lack of Maintenance: Network devices are often not maintained at the same security level as general-purpose computers. They may lack antivirus software and regular patching.

  • Default Settings: Manufacturers ship devices with exploitable services enabled for ease of installation. Many users don’t change these default settings or harden the devices for operations.

  • Legacy Protocols: Using unencrypted protocols for managing hosts and services makes credential harvesting easy for attackers.

  • Internet Service Providers: ISPs may not replace outdated equipment on a customer’s property, leaving it vulnerable.

To improve security, consider these steps:

  • Segment and Segregate Networks: Divide your network into segments to limit lateral movement.

  • Harden Devices: Configure devices securely, disable unnecessary services, and apply patches.

  • Secure Access: Control who can access infrastructure devices.

  • Perform Out-of-Band Network Management: Use separate channels for management to prevent attacks on the main network.

Find out more about our services.

Back to top