risks

5 pts.
Tags:
Network security
Security risks
risks
1

Answer Wiki

Thanks. We'll let you know when a new response is added.
1. Computer Viruses
Computer viruses have been in the news lately for the devastating network security risks they’ve caused around the world this year.
Viruses can pose just as big of a threat to smaller companies. Viruses can corrupt your files and delete valuable data, negatively impacting your daily operations. Viruses have the potential to wipe clean your entire hard drive. It’s important to advise your staff to never open an email or click on a link they don’t recognize.

2. Software Vulnerabilities Pose Network Security Risks
When a security update pops up, it’s easy click out of it and then forget to come back to it. If you’re not updating your secueity ans anti virus software as regularly as you should, you could be putting your company at risk. If your software is not current it could cause your site to crash. This may mean you could be losing customers. 

3. Hackers
Hackers can cause devastating damage from anywhere. Once a hacker breaks into your system, they have free rein. They can steal files, gain access to privileged information, lock you out of your data for ransom or expose trade secrets for your competitors and the world to see.
They should alway be in the back of your mind.

4. Employees Can Breach Security Without Knowing
Any employees can pose a threat to your security. It’s not intentional, it’s a lack of education and policy enforcement.  Keep them off sites like file sharing or publish a list of unsafe websites they shouldn’t visit on the company network. Better yet just block the sites at the network level.

5. You Don’t Know What You Don’t Know
As technology evolves, network security risks as well as the hackers become more advanced.

Trying to keep up with ever changing network security can sometimes cause you miss something. By then the damage may be done. If you don’t under stand ask for help in many of the forums available or call in the experts.

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • ToddN2000
    Sound like a classroom assignment or interview question...If it's a real world issue provide more network details. 
    136,250 pointsBadges:
    report
  • Subhendu Sen
    Assuming you are in a learning process. To gather solid knowledge and your better future It is better to read/ understand your study materials thoroughly. Also you can get help from several external resources like renowned books, latest IT magazines etc.
    142,210 pointsBadges:
    report
  • ToddN2000
    Just to add a few more risks..
    1. Ransomware. This can be a vicious and heartbreaking attack when certain information and devices are locked and held for ransom. This is especially true for medical equipment that’s unfortunate enough to accidentally download this malicious code. The Internet of Things will open up a fertile attack ground since certain devices lack even basic security features.
    2. Software vulnerabilities. Because not everyone updates software consistently with patches, this poses a huge risk from an attack by hackers. There is a constant stream of fixes issued in vendor security patches and updates that must be installed for optimal security.
    3. Hacktivism. While not new, hacktivism has become mainstream thanks to the collective Anonymous system of hackers. Usually with a political motive, these hackers launch distributed denial of service attacks to hamper traffic or cause widespread damage to entire systems.
    4. More backdoors. Backdoors installed by sophisticated hackers can work to decrypt data, leading to theft and black market activities. This may give rise to nation states intercepting large amounts of VPN traffic from a backdoor.
    5. Online transaction fraud. Chip and PIN innovations have greatly increased security for bank and credit cards, but that won’t stop fraud altogether. It will simply move to online stores and retailers or even transactions made over the phone.
    6. Altered data attacks. Attacks that sabotage data, changing it or manipulating it in some manner, are difficult to detect. Even a slight alteration in data can have enormous complications and consequences.
    7. Cloud attacks. Mobile devices with apps that rely on the cloud are an excellent opportunity for hackers to remotely attack private and public clouds to access corporate networks. Malware will be created to specifically crack cloud-based systems.
    136,250 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: