Users can add the user to a trusted device, and will also confirm the device via email associated with the teamviewer.ĭata integrity is an intelligent method of analysing the user behaviour and also check if the IP of the user have been reported previously. The trusted device will allow users approve of a another computer logging into their computer. Nobody knows the current situation, but Teamviewer have acknowledged the error and in response implemented two new security features, Trusted Devices and Data Integrity. Users have headed to the internet frontpage, Reddit, and talk about how Teamviewer was used to access their computer and an unknown person trying to make purchases. According to users on Reddit, hackers are using Teamviewer to connect to user's computer, and are stealing important information, which includes PayPal information, Bank accounts, while some make purchases from your computer to their shipping address. More than a third of Risk Assessments immediately trigger major investigations.Popular remote login software, Teamviewer has been hacked. With an Internal Risk Assessment, you’ll see dozens major security risks within your enterprise (including who’s using Teamviewer). Has TeamViewer compromised your organization?ĭtex can give you the answer. They either have to search across lots of systems, or they’re using an inferior endpoint tool that can only search back a couple of weeks. What we find at most companies is that they have a really hard time answering questions like this. It should only take you 30 seconds or so to get an answer. But can’t we find this using tools we already have? Using an endpoint visibility solution like Dtex means that you’re not leaving it to chance. With this method, you can never be sure that this known risk isn’t compromising your enterprise - and you need to be. Those are some consequences that warrant a lot better than “good enough.” Plus, it would seriously hinder productivity. But these are completely unenforceable directions, and people often ignore these sorts of mass warnings.Ī mistake here can cost your enterprise dearly in the form of lost data, potentially causing a huge breach. The big problem with these sorts of situations is that a lot of enterprises don’t know how to handle them.Ī lot of companies just send out company-wide emails - if you use Teamviewer, please update your passwords or If you use Teamviewer, please uninstall it. Handy, right? Sure, that’s cool and all, but is it really necessary? This way, we can reach out individually to these users and make sure that they follow the right procedures - and confirm that they haven’t already been compromised.Įven better, we can use this visibility to make sure that no one continues to run or install TeamViewer after we tell them not to. It leaves us with a neat-n-tidy list of which users and machines we need to worry about. This search took ten seconds, and showed us everyone who has ever run TeamViewer this year. Using Dtex, we were able to do a simple search in order to locate everyone who has ever used TeamViewer in our company. We don’t mean to be full of ourselves (really! We don’t!) but we had a major advantage when it came to tackling this issue: Dtex itself. So the real question is, what can you do to be certain that your enterprise isn’t compromised by a certain application? Here’s how we approached it. This, after all, is the ultimate insider threat - the outside attacker getting complete, unrestricted access to one of your employee’s machines. Not good news, especially since we knew that lots of our employees had TeamViewer installed on their machines, and use it regularly. Lots of users were reporting that their computers were taken over by a third party and their data, passwords, and money was stolen. But that’s exactly the situation that Dtex found ourselves in last week, when major news outlets started reporting that Teamviewer, a popular remote-access software, had been compromised. No security professional likes to wake up in the morning to hear the news that a commonly-used development tool has been compromised.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |