top of page
Liz Lindsay

The Attack Surface goes way beyond your employees



Many breaches begin with a Keylogger installed on an outside device logging into the larger enterprise. In the case of the big Target hack, an HVAC contractor fell victim to a phishing attack in which a Keylogger was installed. The hacker was able to steal the HVAC’s network credentials as they logged into Target’s systems to monitor retail store temperatures. From there, cybercriminals were able to gain further access deeper into Target’s network and enter their payment system. Target would have little control over the entire contractor and partner ecosystem unless they required endpoint protection by contract.

Providing customers with endpoint protection is also important. When personal information is stolen in a data breach, thieves can buy and sell your customer’s data on the Dark Web and further target them to commit fraud in the victim’s name, use their credentials in account takeover or target them with phishing attacks that download malware such as Keyloggers onto their device. In 2020, there were over 2,935 publicly known breaches and 36 Billion records stolen. In the last two years, account takeover increased 38% and 47% of U.S. consumers experienced a financial ID theft. This results in loss of trust and a tarnished reputation to the breached company. Offering customers effective cyber protection could be a first step in reducing the risks to the enterprise and its customers. ACS’s EndpointLock™ Keystroke Transport Layer Security (KTLS™) Protocol provides strong cryptography at the time of keystroke entry into any desktop or mobile device. EndpointLock’s 256 Bit Keystroke Encryption software also comes with access to our Dark Web Scanner, which allows the user to scan an unlimited number of email addresses and find out if any of their associated accounts have already been compromised in a data breach on the Dark Web. This knowledge will help them protect those accounts and stay one step ahead of hackers. Providing keystroke protecting software to all of your employees, vendors, partners and customers can help eliminate the risk of a breach by reducing your attack surface, protecting access credentials and safeguarding your biggest assets.



#IDENTITY FRAUD #IDENTITY THEFT #KEYLOGGER #KEYSTROKE ENCRYPTION

11 views0 comments

Comments


bottom of page