Prøve GULL - Gratis

Strengthen your network security chain

Voice and Data

|

December 2020

A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it

- PAUL DUCKLIN

Strengthen your network security chain

Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.

If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.

For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.

Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.

FLERE HISTORIER FRA Voice and Data

Voice and Data

Voice and Data

Rebuilding enterprise DNA with AI-ready platforms

SAP is rebuilding enterprise foundations with AI-ready data fabrics and secure automation frameworks to create a scalable, intelligent infrastructure.

time to read

5 mins

November 2025

Voice and Data

Voice and Data

SECURING THE 5G ENGINE FOR A SAFER DIGITAL WORLD

India's 5G revolution demands a defence-first mindset as cyber threats escalate, making trust, resilience and Zero Trust security essential for a digital economy.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Get smarter SOCs in the age of intelligent threats

Al-powered SOCs are transforming security, combining automation and intelligence to enhance detection, response, and cyber resilience across the industry.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Building the nation's long-term digital spine

India needs a future-proof fibre backbone to deliver reliable, scalable, and mission-critical connectivity for a Viksit Bharat through 2047 and beyond.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Are telcos ready to let AI take the wheel?

AI is reshaping how networks run, decisions are made, and customer experiences evolve-pushing telcos to prepare for an era where intelligence drives the core.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

IGNITING A NEW ORBIT FOR SPACE RESEARCH

From mission design to Earth observation, HPC is now the hidden engine accelerating simulations, autonomy, and discovery across global space science.

time to read

10 mins

November 2025

Voice and Data

Glasgow scientists develop AI model to decode protein talk

PLM-interact decodes how proteins communicate, predicting interactions and mutations to speed up disease and virus research.

time to read

1 mins

November 2025

Voice and Data

GPS spoofing at IGIA: A wake-up call for national security

The disruption at Indira Gandhi International Airport (IGIA), where more than 800 flights were delayed or diverted following an alleged GPS-spoofing incident, is a wake-up call for India's aviation and communication systems.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

The wireless foundation of neo-industrial growth

India's next phase of growth will be shaped by secure, scalable wireless platforms that unify connectivity, strengthen security, and accelerate innovation.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

Scalable, secure, fast: The Cloud CDN advantage

Cloud-based CDNs are redefining digital performance, delivering speed, security, and scalability at the edge for a seamless user experience.

time to read

4 mins

November 2025

Translate

Share

-
+

Change font size