SHARE
Facebook X Pinterest WhatsApp

Five Backdoor Entrances You Need to Secure

Corporate security is serious business, but you may not realize it if you're leaving the back door open to cyber criminals. If you’re not sure, it can be a daunting task to constantly monitor for new and emerging threats that come through a variety of channels. That’s why AVG Technologies has shared the top five backdoor entrances […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Feb 25, 2011

Corporate security is serious business, but you may not realize it if you're leaving the back door open to cyber criminals.

If you’re not sure, it can be a daunting task to constantly monitor for new and emerging threats that come through a variety of channels. That’s why AVG Technologies has shared the top five backdoor entrances you should know.

Five Backdoor Entrances You Need to Secure - slide 1

Click through for five vulnerable access points all companies should know about.

Five Backdoor Entrances You Need to Secure - slide 2

Most social networking activity is concerned with community spirit and sharing of a wide range of data including documents, music, video and links. The biggest problem here is trust. People trust people that they know, or that they think they know. This means that users are more likely to click an infected link if it comes from a trusted colleague or friend.

Businesses need to beef up their security policy. Only 23 percent of companies have security policies in place that specifically address social media. Offer staff guidelines to keep them and your company network safe.

Five Backdoor Entrances You Need to Secure - slide 3

Viruses and other malware can be hidden in files sent via Instant Messaging (IM). Introduce policies that educate and control the use of IM. One important step is to ensure that user’s e-mails cannot be easily identified by their IM username. Having your e-mail address so readily available is bound to increase spam and phishing attacks.

Five Backdoor Entrances You Need to Secure - slide 4

While companies are concerned about outsiders breaking into company networks, employees pose a similar and possibly even greater threat. Employees are in fact responsible for introducing the majority of malware onto company networks. You may want to consider running additional background checks on IT staff in responsible positions before hiring them. The best advice is relatively basic – trust your gut instincts, educate staff on keeping their data and network safe and enforce a robust internal security policy combined with a security audit.

Five Backdoor Entrances You Need to Secure - slide 5

While preventing staff from introducing malware into a business has its challenges, staff that are allowed to access the company network remotely are even harder to control. Allowing staff to use their own machines for work increases the risk that malware may get inside the company network. An obvious way to close this security hole is to prevent staff from using their own machines.

There are other ways around this such as using virtualization technology to create a virtual safe-zone within your hardware – like an embassy in a foreign country. However, it is arguably simpler and more effective to establish a strong set of security controls that ensure all staff use only company hardware with anti-virus controls that are subject to updates and audit procedures.

Five Backdoor Entrances You Need to Secure - slide 6

USB sticks are particularly good at spreading malware. They appear innocuous compared to a laptop or smartphone but can hold several gigabytes of code – some of which may be malicious. Allowing employees an unchecked option to insert these into company computers is an unnecessary risk.

Removable devices can be automatically checked using anti-virus software or users can choose to run a manual scan before accessing any of the files on the stick. Business owners should also create policies to keep personal and business drives separate on any machine.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.