CCTV and M2M SIM Malware Vulnerability

^

Data usage

Malware increases the amount of data sent and received through your network, usually because the program is sending confidential information, network maps and checking the network for any other devices it can copy itself on to.

In turn, this increases costs on metered data connections, especially when SIMs go over their allotted data allowance, prompting additional costs on much larger per-MB pricing.

^

Data breach

Losing confidential information can be deadly to businesses of any size. Whether the data is intellectual property, customer information, bank accounts, usernames and passwords; they all can have massive impacts on a business’ ability to operate.

The right password and username could enable hackers to take over social media accounts, such as the recent twitter hack.

Intellectual property theft could take away a business’ advantage in their market

The loss of customer information could cause irreparable damage to a business’ reputation and expose them to legal challenges as well as GDPR fines.

^

Ransomware

Just like in 2017, when multiple NHS trusts were brought to their knees (costing nearly 100m to rectify), malware can be used to lock employees out of their devices, and only open them back up once a ransom is paid.

These attacks are becoming more frequent, and with smaller businesses having less to invest in their security policies, savvy hackers have started to access massive corporate entities via smaller partners in their supply chain, as a more viable route to access larger ‘prey’.

^

Public IP addresses

This most recent behaviour shows just how important it is for businesses to limit the number of ports open on routers accessing the public internet. In fact, the National Cyber Security Centre has recently released new advisories regarding router port permissions, mitigating this type of attack.

Instead of “Forwarding all ports”, it is better to set up “Forwarding only the required ports” to the target device as port forwarding in the router:

Open Services / Servers

  • Open mDNS services (port 5353)
  • Open DNS resolvers (port 53)
  • Open SNMP servers (port 161)
  • Open SSDP servers (port 1900)
  • Open portmapper services (port 111)

Administrative Services

  • SSH (port 22)
  • Telnet (port 23)
  • Telnet (port 2323)
  • RDP (Port 3389)

* This is typical best practice, but ports may change depending on your provider and hardware. A description of how to set up port forwarding can usually be found in the instructions for the router you are using. For more information, please refer to your operating system documentation or contact your network administrator. *

^

Regular updates

It turned out that the underlying cause of the NHS’s WannaCry attack was simply software that hadn’t been updated in way too long. Manufacturers like Microsoft, Apple, Cisco and HP, as well as software vendors regularly find vulnerabilities in their products and release updates to prevent them being leveraged.

We know how frustrating it is to hold-off on urgent work when that little pop-up says your computer needs to update and restart – but we do recommend you keep to a regular update schedule to prevent as many attacks as possible!

^

Managed services

The most hands-off, and convenient, method of securing your network is by trusting it to IT experts who can keep a vigilant eye on your network, and ensure any unusual behaviour is investigated and mitigated before any damage can be done.

And that’s exactly what Everything Voice can do for you!

Why should I upgrade to Ethernet Flex?

If there’s one trend that all businesses can agree on, it’s that their appetite for bandwidth is growing.Global data consumption(1)1992 - 100GB per day1997 - 100GB per hour2002 - 100GB per second2007 - 2,000GB per second2017 - 46,600GB per second2022 - 150,700GB per...

read more

Ethernet Vs. Broadband – who’s your winner?

As businesses look to future-proof their communications and connectivity services, readying for the 2025 switch-off, it can be understandably confusing… There are so many competing technologies and services, all of which have their own downsides and benefits. Though...

read more

M2M SIMs: the definitive business guide

Everyone with a smartphone knows what a SIM card is. SIMs make it possible for all of us to connect to the Global System of Mobile Communications Network, also known as GSM. M2M SIMs are similar to the little pieces of sophisticated plastic we all have in our phones,...

read more

5 ways a data pool will save you money

If you manage business premises, or run a company that provides security and facilities management for business premises, it’s fair to say that the Covid pandemic has given you an extra headache you really didn’t need. During lockdown, premises were vacant and...

read more