Not only do you have to worry about physical threats, you also have to worry about cyber threats and vulnerabilities. Vulnerabilities can allow attackers to run code, access a system’s memory, install malware, and steal, destroy or modify sensitive data.

WHAT ARE VULNERABILITIES?

The definition of vulnerabilities is in the previous paragraph. But to put it in simpler terms a vulnerability is a weakness in the software. When manipulated can give an attacker the means to do something malevolent or unlawful.

 WHY SHOULD YOU CARE ABOUT VULNERABILITIES?

Google, Microsoft, and Apple create software updates every month for their devices, smartphones and home computers alike. Some of the software updates add new features, but most of them are to fix bugs or have patches for vulnerabilities. Thankfully your devices will automatically update, and you don’t have to think about it until you need to restart your device. There are three categories of software that every person uses, and each can have its own vulnerabilities:

  1. Operating Systems: all major operating systems; Windows, MacOS, Linux, iOS, and Android.
  2. Software Applications/Apps: Apps in the iOS and Android app store also get automatic updates from the vendor. But just because the app is in the app store it doesn’t mean that the software developer is supporting and updating their apps so be careful what you install.
  3. Firmware: Some systems on your network will have the operating system and software all bundled up into one package called firmware. Firmware is found on devices like smart doorbells or smart light bulbs.

PROTECTING YOUR NETWORK FROM VULNERABILITIES

You might not think about your internet connection. There are six times of systems on a network:

  1. Infrastructure devices: router, switch, wi-fi repeaters/extenders
  2. Laptops and desktops
  3. Gaming systems 
  4. Mobile devices
  5. Network-attached storage, printers and other output devices
  6. Internet of things devices: “Smart” devices like smart TVs, smart light bulbs, smart thermostats, smart doorbells

Just like your computers and mobile devices, these devices have their own vulnerabilities. Some of the developers have discovered and developed patches for the vulnerabilities, while others will be discovered in the future. 

The epicenter of your network is your router. It’s the device that connects to the internet and also protects the devices in your home from regular attacks coming from the internet. The router contains a lot of functionality:

  • Firewall: protects your network from constant attacks from the internet
  • DHCP server: assigns an IP address to each of the devices that connect to your network
  • NAT server: acts on behalf of each device on your network to make requests to servers on the internet
  • Your router also may include a time server, DNS relay, and maybe even a VPN server

 

About the Author

Experience Audio Video has been serving Orange County and Area since 1999 for residential and commercial audio, video and security camera  installation services. 5 Star Yelp Ratings, Thousands of Referrals, there is not a better choice than Brian Chappell and the Experience Audio Video Team (License #804783). One phone call and you will know right away the difference in working with Experience Audio Video vs. others in the area. Contact us now at 714-744-4455 or info@eav-inc.com for a Free Consultation.