The hacking of #PanamaPapers

By May 17, 2016Backup, Security, Technology
Security Layers

On April 20th, an article titled: “Temen que bufetes puedan ser ‘hackeados’ para fines negativos” was published in the Panama America newspaper, where it explains that other Panamanian law firms could suffer a possible malicious intrusion in order to extract valuable information about their customers and activities. In my opinion, no security system, whether internal or external, it’s 100% foolproof. It depends a lot on how vulnerable is your infrastructure and how can we minimize a breach when we deploy different layers of security. There are several ways of accomplishing it, the idea here is to make the intrusion harder and wait and see if the hacker desist on his/her attempt to infiltrate your network. Here at Backlayer we make the following recommendations:

1. Firewall

It’s the first, and most important, layer of security your infrastructure should posses in order to avoid any intrusions via the Internet. It’s like the front door of your home. It has to be strong and bold, able to recognize and support any possible attack that can happen at any given moment of the day. There are different companies and models offering many solutions, it depends on your budget and level of security required.
2. Antivirus / Antimalware

At the PC level, it’s a very important layer of security you must have due to the fact that detects any intrusion by viruses and malware programs sent via email, downloaded from phishing websites or introduced from a disgruntled employee, and protects the health of your equipment by constantly scanning your files for anything malicious. Most viruses will render your computer unusable, affecting the performance of your company. Some variants may also target and encrypt your files holding them ransom while asking you to pay a hefty amount of money to recover them.

3. Backup

The third layer of security we recommend has to do with the different versions of your files being backed up. In the most extreme case that one might lose a very important file, this measure can save you from having a bad headache. As we mentioned it in an earlier post, 5 tips to recover from a disaster situation in a fast and effective way, ” … it’s important to understand that cloud backup is part of an evolution…”

4. Network Monitoring

Many companies nowadays don’t see the need to invest in a 24/7 monitoring service, but what most don’t understand is that most hackers do not rest until they find a way into your network and your data. It’s a layer that many ignore because they believe they are secured or that no harm might come while they’re sleeping. Backlayer offers a very effective and affordable way to manage and monitor your infrastructure, contact us for more information.

5. Strong Passwords

All of our storage devices, from servers to tablets and cellphones must use strong passwords in order to avoid any potential data loss. Sometimes we don’t consider how easy it is for an expert hacker to figure out a simple password using social skills. So in order for a password to be strong consider using alphanumeric characters (A-Z and 0-9) as well as symbols (!@#$%*?). Also the longer the password the better, just make sure to remember it.

Comments

comments

836-6278