Use your computer fearlessly.




[ Security | Consulting | Research ]





Insecurity

by Brent Kirkpatrick

(Date Published: .)



The hacking arms race is being lost.



Breach after breach, intrusion after intrusion. The hackers are winning. We are left with destroyed files, destroyed hardware, and harassed users.

Ten years ago, your work place had one computer per employee. Today, there are 2.5 computers per employee. One desktop, one cell phone, and fractions that account for the copier and cloud computing. Your IT department only maintains only one of these. Yet, 1.5 of those computers have access behind the firewall and can be used to attack your network.

The phones your employees carry travel around and visit many subnetworks that are barely maintained. The local coffee shop that forgot to update its router for the last WiFi hack. The cell tower in Vegas that got hacked by the mob. This phone comes back your network after each of these trips and brings its hackers with it.

How many high-risk mobile devices do you have on your network? Let us work it out. There are y IP addresses leased out right now. You have x employees which are your users. When you walk around the office, you can count b mobile devices which do not typically leave the premises. We compute the fraction of high risk devices, a, from the equation a x + b = y by solving for a which is (y - b) / x. Suppose you have 1259 IP addresses leased out on your wireless network to 300 users and you have an inventory of 572 tablets that remain on site. Then your users brought 687 high-risk devices to work with an average of 2.29 devices per person.

Secure the mobile devices. Secure your network.


defendIT. AI-driven security measures derived from security incident data.











bbkirk@intrepidnetcomputing.com




© 2015, 2016, 2017, 2018 Intrepid Net Computing. All rights reserved.