How Hackers Stealthily Breach Your Company's Network

Download MP3

You might not think you're at a big risk of cyber attacks because you're not a tech company. You might be a manufacturing company, a retailer, or some other non-tech type company. But cyber attacks are actually more common in non-tech companies, and your actual building—your structure, your facility—might be the target.

How is that the case? Well, every building has many types of digitized management systems. Your HVAC is probably connected to the internet, your fire alarms, your access key code swipers, security cameras, security gates—all of those items are basically mini computers connected to the internet. And because they're not full-fledged computers with a screen, many times the firewalls and cyber defense aren't fully optimized for those kinds of devices.

Hackers are targeting those types of resources, those types of objects and technology, because they're easy to get into and they're not easy to discover that there's been a hack. The more devices you have connected on the network, the bigger the threat. All they need to do is get into one device.

We had a case where a client had a security camera at a car dealership. The hackers got into that camera. The camera was connected to the internet. That connected to their server. They found all their passwords, all their accesses, and were able to get into their accounting, their payroll, their accounts receivable—all of that just from a security camera.

So make sure, as part of your best practices, you look at the census of devices on your network. And it's easy to do—an IT person can do it and monitor those. A good cyber liability insurance policy is going to do that automatically if you buy a cyber policy, not an endorsement of cyber on your existing liability policy. If you buy a standalone, separate cyber policy, most of those companies are going to put on your system a monitoring app that will passively look at all your devices and see if any of them are compromised.

And you know, the cost of the insurance policy might be less than it would be to pay somebody to monitor your devices anyway. Plus, you get the insurance almost for free. And if there's a breach, they have response teams. So you want to monitor all these because the little mini devices you have on your doors, your windows—all these devices connected to the internet are tapping into your network and they're easy to find.

The hackers are out there scanning millions and millions of IP addresses every day. And all it takes is one to get into your system and shut you down for ransomware. That could cost you hundreds of thousands or millions of dollars.

Thank you for watching. Remember, you can access live one-on-one personal consultations with a licensed private investigator, a licensed commercial insurance broker, a licensed certified real estate title examiner, and also a certified civil court mediator. So if you have a need to talk to an expert in any of these fields—or even a licensed building general contractor—you can click the link below: actualhum.com and arrange a live one-on-one undivided attention with a licensed expert, where you can ask any questions, get information about your situation, and we'd be glad to help.

How Hackers Stealthily Breach Your Company's Network
Broadcast by