Infrastructure: gain only the benefits of increased connectivity, not the risks

Networks, Telephony and BYOD

FOXMOLE helps address the multiple challenges now present in the workplace:

  • Networks: hackers seek full domain access and target privileged user accounts used by system administrators to fast-track access to key systems. A UK DTI survey revealed that 72% of all companies received infected e-mails in 2015, and for larger companies this rose to 83%. Another risk is the potentially unauthorized use of technologies such as Dropbox for quick data exchange.

  • Telephony: VOIP solutions are increasingly adopted by enterprises to reduce costs, but bring multiple risks such industrial espionage/insider trading should calls be accessed, attempted free use of the company's VOIP service, and hackers slowing down connections to reduce call speed/quality.

  • BYOD: employees can unknowingly allow an app to install malware that can access the smartphone's network connection and cause major issues. In addition, employees also bring a various devices to the workplace (private phones, smartwatches, tablets, usb-sticks,…) as well as subcontractors who take their own laptops. All of these devices are connected and attached to the corporate infrastructure. Since these devices maybe already be infected but almost certainly have a lower security level, they increase the likelihood of an breach.

Buildings - Offices and Factories

With every technical enhancement in both offices and homes comes an associated risk. Take simple computer automated electric blinds in a large building - what if this system was accessed and security shutters were opened in the night to allow thieves to break in? This is not a common employee or householder concern, but perhaps should be. What if the infrastructure vendor no longer releases security updates? What if it has a remote support/access functionality with a default password that has not been changed?

At the end of the sophistication spectrum are apps allowing house or office doors to be opened without a swipe card or key. These apps risk exposure to hackers if proper safeguards are not in place. Every aspect of a building that has a technology component with some form of connectivity risks hacking. FOXMOLE has solid experience of how physical structures are vulnerable to security threats, and how to mitigate these.

Internet of Things (IoT) and the Connected Car

Industry research suggest there will be 50 billion connected devices by 2020. The rise of IoT offers huge potential for efficiencies and improved quality of life. However, there are multiple security risks to the use of anything that is connected to the Internet, for example:

  • Wearables: sensitive user data may be accessed (weight/health/location)
  • Medical devices: drug dosage or heart monitors may be altered
  • RFID: goods in transit may be monitored and haulage companies robbed
  • Automobiles: the "connected car" may be controlled by a hacker and key functions (brakes, steering) locked.

All of these feature embedded systems that can be hard to patch when a vulnerability is identified. FOXMOLE offers strategic advice as to how to adopt IoT rapidly yet securely.

Contact Us

Please call +49 6151 86086-277 (Germany office hours)
or email: info@foxmole.com