article thumbnail

Top Deception Tools for 2022

eSecurity Planet

From bank transfer cons to CEO fraud to elaborate phishing and spear phishing campaigns, cyber criminals have been quick to use deception as a major means of infiltrating networks and systems, and for remaining undetected while inside. Decoys mimic hosts running operating systems as well as IoT (Internet of Things) hosts.

Cloud 131
article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

Email-based phishing attacks : These can include both of the above attacks and typically target employees through their business email accounts. This includes IoT devices. Sooner rather than later, you’ll want to perform an audit of your OT and IoT devices. Sometimes this malware can laterally move through the network.

Security 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

The internet of things (IoT), operations technology (OT), and the industrial internet of things (IIoT) also now connect to networks. For example, hackers can use packet sniffers or a phishing link using a man-in-the-middle attack. endpoint security (antivirus, Endpoint Detection and Response, etc.),

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Endpoint: Enables access for human users and computer services and commonly includes PCs, laptops, Internet of Things (IoT), and operational technology (OT). Internet of Things (IoT) security: Encompasses a variety of tools and techniques to secure IoT, operations technology (OT), and other similar categories of endpoints.

Security 118
article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

Asset Discovery Controls Unauthorized devices can intercept or redirect network traffic through attacks such as connecting unauthorized computers to the network, deploying packet sniffers to intercept network traffic, or delivering a phishing link to a man-in-the-middle attack to steal login credentials and data.

Security 108
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For modern networks, the introduction of new endpoints – be it remote laptops for personnel or client IoT devices – is a roadblock being actively addressed. Decentralized data storage that removes the need for a honeypot. Types of Endpoints Matter. Distributed PKI and multi-signature login capabilities. Block Armour.