LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources | Members | User Guide

We Don't Have Any Hackers in North Dakota!

It is a misperception to believe that only the government and large corporations are under attack by hackers, or that smaller organizations only have trouble with hacking when someone has a beef with them. Though there are stories in the news about disgruntled ex-employees getting back at their former employers by disordering their computer systems, it really is not the norm. In fact, smaller businesses are likely more affected by indiscriminate broad-based attacks than larger organizations. With their less sophisticated equipment and smaller IT budgets, they are the lower-hanging fruit.

The truth is, hackers are out to get any computers they can, whether in North Dakota or Timbuktu, the quote from which the above title was derived notwithstanding. Most hack attacks are broad-based fishing expeditions, putting a lot of lures out there to see if they get any bites (bytes?). The worldwide connectivity provided by the Internet has rendered geographic location rather meaningless — the only way geography can make a difference is its presences or absence of the Internet. So, North Dakotans, you do have to worry about cybersecurity just as much as the rest of us.

Even if a computer has absolutely nothing on it and is never used for anything but watching cute cat videos, but is merely on and connected to the Internet, it has value to a hacker. Its raw computing power and Internet connection present a valuable resource to any malicious actor who can take it over to further their own ends (that is why even so-called "smart" appliances, like refrigerators, get hacked — it's not because hackers concern themselves with how healthily we eat!).

With a computer's raw computing power and Internet connection, a hacker can, among other things:

  • Distribute SPAM, malware, spyware and ransomware
  • Perpetrate click fraud
  • Take part in a coordinated attack on specific targets, such as denial-of-service attacks on banks and governmental institutions
  • Sniff out the communications of other devices on the computer network
  • Set up a content delivery system for stolen, illicit or illegal materials or as a relay station to hide the ultimate source of such materials
  • Send out widespread probes to find other vulnerable computers
  • Run cryptomining software

If the computer is used for any communications, financial transactions or business, it adds yet another layer of value to hackers, beyond its computing power. In this case the hackers can, among other things:

  • Install keyloggers to capture user names and passwords
  • Send malicious emails to your email correspondents
  • Steal sensitive data from the computer's hard drive
  • Lock up the computer using ransomware

The take away? Everyone in all fifty states and worldwide should take care in how they handle their email, their web-browsing and their computer networks, from the home user to the corporation. LAD provides a way for any user to increase computing security and privacy with its host of practical networking tools, including local access control, blacklisting, DNS logs, packet capture and domain-based filters.

Download LAD | Learn More About LAD | LAD for Home | LAD for Business | DIY VoIP PBX

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. LAD takes you back to before the Internet!