Partner Perspectives  Connecting marketers to our tech communities.
12/5/2016
01:55 PM
Jonathan Anderson
Jonathan Anderson
Partner Perspectives
50%
50%

Protect Your Company From Hackable Holiday Gifts

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.

Every year new toys, games, and devices come out with increasing levels of Internet connectivity. Some of these lack fundamental security precautions and end up on the Most Hackable Holiday Gifts list. After the holidays, some of these devices will end up in the office, used by employees for their work as part of your BYOD policy, or brought in to share, show off, and play with. In addition to providing entertainment for the office, they also present risks to your data and systems.

The vast majority of people start using their new devices soon after they open them. However, fewer than half follow appropriate security measures such as changing default configurations and passwords, installing critical updates, or adding security software. Here’s a look at this year’s most hackable holiday gifts.

Bring Your Own Device

Laptops, tablets, and smartphones top the list of this year’s hackable gifts, and more than 50% of consumers surveyed by Intel Security plan to purchase at least one of these devices. While readily hackable in their default form, most organizations are well protected against threats from these devices, blocking them from the corporate network or quarantining them on an isolated network segment unless they meet the corporate security standard.

Media Players

Media players and streaming sticks are becoming popular and will likely make it into the office as people use them to stream music, watch TV shows, or use them to easily connect their devices to corporate monitors. Employees will connect them to the office Wi-Fi network, not realizing the potential risk of an unsecured device or the vulnerabilities of older, unpatched software. Again, blocking access to unauthorized devices or restricting them to an isolated network segment is the best defense.

Home Automation

Controlling things around the house, from thermostats to door locks, is another growing market that may not show up on your risk assessment. However, these devices are connected to the Internet through home routers and may provide attackers with a path into your company when employees work from home. Hackers and security researchers have already demonstrated that they can compromise some of these devices. In addition, employees will be checking on their smart home devices from the office, frequently visiting third-party websites and using smartphone apps with uncertain security profiles. Completely blocking access to these tools will likely cause a backlash from employees. Web gateways, data loss prevention, and network traffic analysis will be necessary to detect and prevent breaches, data exfiltration, or credential theft from compromised home automation sites.

Drones

Whether used for fun or for business, you can pretty much guarantee that a drone will be passing through your business in the next 12 months. Wireless connectivity, smartphone apps, and even the onboard software all present potential threats to your information security. Again, blocking access to unauthorized devices or restricting them to an isolated network segment is the best defense. However, if your employees are using these devices for business purposes such as promotional videos or aerial photos, they may end up connected to the core network. Additional precautions then become necessary, including ensuring software versions are up to date, changing default passwords, and installing appropriate security controls.

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach or cyberattack later and still allow your employees to enjoy their new toys. Learn more about the McAfee Most Hackable Holiday Gifts list and follow us @IntelSecurity

Jonathan Anderson is responsible for technical strategy and integrating security into future IoT solutions at Intel Security. Prior to joining Intel, he served 14 years across both Cisco and HP where he continuously interlocked with customers, sales force, and product teams ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.