Skip to the content

Passwords, Rootkits and Remote Code Execution #BeCyberSmart

Remote Code Execution  WATCH VIDEO

Remote Code Execution is a very serious attack, and when vulnerabilities are discovered that allow an attacker this capability, they are nearly always a critical update. 
They often go a little bit further than Malware, because you don’t need malicious code for an attack to be instigated, the very vulnerability in the device / code is the malware, an attacker just utilises what is already there.
 

Find out why: 
- Anti-malware software is important.
- Firewalls and Web Application Firewalls.
- Consistent and quick patching is key.

 

Rootkits WATCH VIDEO

Root in computer terms relates to the core of the machine, the highest level of admin and access and another version of Malware, however, this one needs to be called out especially as it is fundamentally designed to be invisible. 

They can sit there for many days/weeks/months/years, simply waiting until you and your device become useful to the attacker.


Find out why: 
- Keep track of system process.
- Anti-malware software is important. 
- Quality firewalls detect malicious comms!

 

Password Attacks WATCH VIDEO

We all know how to make a secure password a long string of letters and the odd uppercase and lowercase, a couple of numbers, some special characters and it's done, or is it? 

So why do we need a super secure password, no one will attack me right, I’ve got nothing to hide or nothing of value? Cracking that poor password can easily reveal more than you realise.

Find out why: 
-  Password length is key.
 HaveIBeenPwned.com is useful. 
-  Turn on multi-factor authentication.

 

If you need help, please get in touch with our security experts

 0800 688 8858 or visit ChessICT.co.uk

 

About the author

Joseph Ball

Joseph Ball

Joseph Ball is a cybersecurity professional with years of experience in the telecommunications industry. Previously worked for the British giant BT where he was responsible for developing and managing the threat landscape and risk realisation, Joseph joined Chess as the Information Security Officer at the beginning of 2019.

Boasting a degree in Computer Forensic Investigations and Computer Security, he spent time advising the Police as a Special Constable where he worked with the likes of FACT and Interpol with regards to media content piracy.

Joseph is passionate about making cybersecurity easy to understand even for non-technical people. He believes that there is not a one-size-fits-all approach, but he will preach best practices to everyone who has a minute to spare.

Speak to a Product Specialist

You can fill out the form and one of our product specialists will contact you shortly with more information.
Sales
To contact our Sales team directly, please call 0344 770 6000 and choose option 4.
Customer Service
For general queries or to report a non-urgent fault, please log a ticket on our customer portal using the email address associated with your account. Logging a ticket is quick and easy to do. Once you have logged your ticket, we will respond within 24 hours or your Service Level Agreement, whichever is quicker.
I agree for my information to be used for marketing communications.