Newsletter Content

Threat Spotlight: Brute-Force Attacks and How to Defend Against Them

b2ap3_thumbnail_attack_on_network_400.jpgOne of the most popular methods of online hacking attacks involves what’s called a brute force attack. This is when a hacker overwhelms a login system with multiple attempts until the hacker is able to log in and access the system. They are dangerous attacks that could expose not just sensitive information, but also leave you vulnerable to ongoing hacks.

What Brute Force Attacks Are
Basically, you can imagine a brute force attack as a method which involves the rapid input of passwords and usernames in succession. They’re designed to crack encrypted data by finding a usable password. Most brute force hacking attacks are performed by an algorithm and can input a ridiculous amount of credentials every second. The reasoning behind the name, “brute force,” is due to the brutal assault on the system, rather than taking a more discreet or intellectual path to hack the system. There are many different types of brute force attacks, but one of the most popular ones is the dictionary attack, in which passwords are generated with a dictionary, using popular words, in order to access the system.

Why They’re Dangerous
According to a McAfee Security Report from 2015, brute force attacks account for about 25 percent of all online hacks, second only to Denial of Service attacks. One of the reasons why they’re so popular is that they can be used as a straightforward way to infiltrate privileged accounts and steal sensitive information. These attacks are typically used to access accounts and steal credentials like credit card numbers, Social Security numbers, and other data that could be used for financial gain.

Furthermore, brute force attacks can be used to install what’s called a rootkit on a device, or turn a PC into a bot. Most often, brute force attacks will be seen as a jumping-off point for other types of threats to terrorize the targeted machine.

What You Can Do
Having a security solution put into place that can lock users out based on IP location or failed login attempts can be a great way to protect against brute force attacks. However, both of these methods can be bypassed if the hacker is using a botnet. Since the botnet consists of several infected computers from all over the world, they will have different IP addresses and be identified as individual users, rendering the aforementioned security practices moot.

Another useful technology to have to protect against brute force attacks is two-factor authentication. By providing another layer of security, in addition to the required password, brute force attacks will be rendered useless. Without the secondary credential that gets sent to a smartphone or email address, any attempts to brute force an account with a password will be pointless. This is why it’s always recommended that you use two-factor authentication.

Your business should be prepared to handle all types of online threats, especially those that can lead to more dangerous or destructive results. White Mountain IT Services can provide your organization with security solutions that are designed to maximize your network’s protection against brute force attacks, and other online threats that could have an impact on your business’s operations.

To learn more about what we can do for your company, give us a call at 603-889-0800.

Related Articles

  • Getting to Know Technology: Hackers It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Belo...
  • Could Your Router be Infected with Malware? Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in term...
  • Virginia To Upgrade Voting Machines. Hopefully Other States ... The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter...
  • Do not Let Hollywood Fool You Into Thinking Hackers are the ... There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everyt...
  • A New Concept Might Take Reverse-Engineering to the Next Lev... Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security concept might be able to protect software from the ...
  • Alert: Users of 7-Zip Should Immediately Upgrade to the Late... One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people w...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions