Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

File sync services provide covert way to control hacked computers

Lucian Constantin | Aug. 6, 2015
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.

Maybe some of the cloud storage providers will improve things in the future, but that doesn't change the underlying issue: that whatever is useful for users can also be useful for attackers, Shulman said. Attackers will eventually find a way to compromise endpoint systems, but most of the time their goal will be to use them as launchpads for attacks against the organization's databases and file servers, where the interesting information is stored. Because of that, it's important for companies to monitor and strictly control access to their important data, he said.


Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.