The Silent Assassin – Keyloggers
A keystroke logger is a devious, unobtrusive spy lurking on your electronic devise, it works quietly and invisibly in the background recording every key struck on a keyboard to gain access to passwords and confidential information. They arrive just like any other malware, come in a multitude of variants and can be difficult to discover. You can be contaminated by simply visiting a website. A browser, app, or out of date operating system can be exploited to covertly contact a remote server authorising malware to be downloaded to your smartphone, tablet, or computer. Keylogging software can take screenshots of your activity, record from your microphone or deploy malicious code only when you’ve accessed online banking. When the cyber-criminal retrieves your log file, he will have access to your most sensitive data such as usernames, passwords, and credit card numbers, etc. Keylogging with spyware is ranked as the highest global malware threat by the NTT Security Threat Intelligence Report.
As employees return to the office post pandemic, many are working under a hybrid workplace policy that includes a predominant number of organisations enabling employees’ remote access to business networks through an RDP connection (Remote Desktop Protocol). A key impact of this policy is that many devices (endpoints) used by employees are unmanaged and are moving ‘into’ and ‘out of’ the network far more often and without protection opening the door for cyber-criminals to walk straight in. And, Mac’s are not immune. Cyber-criminals are out to catch everybody and there are numerous types of keylogging malware that directly target Mac users. Remember this is about capturing key information not infecting or disrupting your activities.
The key strategic action for a business is to ensure that their cybersecurity defence strategy is a multi-layered, swiss cheese approach. This means that you have multiple tools stacked side by side minimizing the chances of the risk. Each tool is layered behind each other so that the weakness in one defence is mitigated by the tool behind it.
What is the defence strategy?
At Computer Troubleshooters we recommend the following key elements for a robust defence strategy:
The above is not a complete defence strategy. Incorporation of other tactical elements such as staff training, testing and data backup and recovery and support are also important.
To learn more:
If this article has raised some questions for you then it is suggested that you undertake a cyber risk assessment. After completing the assessment download the results and call your nearest Computer Troubleshooter for a review and a more detailed discussion.
Or call us at Computer Troubleshooters for a security audit on your existing systems and network 08 8387 3889 or email support@ctsjw.com.au