8 Steps to Protect Your Company’s Network and BYOD from Botnets
Today’s cyber criminals gain remote control over networks of computers ranging from SMB, large corporations, and personal users. They install botnets in any device they can that is connected to the internet. The malicious software, viruses, and key loggers are triggered remotely by the cyber criminal to attack web sites or company network for financial gain.
Network specialists are starting to face major problems in company networks after the introductions of BYOD. Employees bring their infected smartphones, tablets, laptops, and other mobile devices to work. When attached to the network, the malware or other malicious software start to infect the company’s network.
Small businesses today are finding out that size doesn’t matter when it comes to their network computers, routers, servers, and other network equipment attached to the Internet. No one is safe from cyber crime today, and especially from botnets. The criminal will install unauthorized malware on any device they can. The botnets and malware come in the form of emails, email attachments, email links, and visits to Web sites that are infected with malware.
Once a device is infected with botnets, all a cybercriminal has to do is turn on the botnet. This turns the infected device into a “bot” or “robot”. Once any device becomes part of the botnet, they await the instructions issued by the command and control computer(s). The C2 or C&C is the commander controlling the botnet, the C2 will issue commands to perform automated tasks and keystroke monitoring without your knowledge. Cybercriminals use botnets to hide their identity and take control of thousands of computers at once.
How to prevent botnets from infecting your network computers and mobile devices:
It is the job of company’s network administrator’s to educate employees on email and internet safety to prevent botnets from attacking their networks. Unfortunately, today there isn’t 100 percent prevention when it comes to cyber criminals. The only prevention that will reduce the risk is:
- Update all mobile devices, phones and computers with the latest operating system, Web browsers, antivirus latest definitions, app updates, and software updates.
- Enable all automatic updates for software, antivirus software, and operating systems for mobile devices, phones, and computers.
- Before opening any USB device, CD, or external storage device, scan first with antivirus software.
- When your phones or mobile devices aren’t connected to the network, turn off your Bluetooth and WiFi connections.
- Pay attention to public hotspots or unsecured wireless connections. Never enter your passwords, or answer security questions at these locations.
- Notify your network administrator if you think your phone or mobile device is infected with botnets or other malware.
- Pay close attention to “scareware” notifications. This is a cybercriminal trying to compromise your device.
- If you think your computer or mobile device is infected with a virus, malware, or botnets, don’t connect to the company network. Instead, take this device to your IT department to safely remove the malware.
It is important for companies to keep their employees informed of all cybercriminal activities that could compromise their network. Make sure your employees understand the importance of device and network safety. Educating your employees will help prevent your network from being breached by cyber criminals.