Page 33 - Cyber Warnings
P. 33







In addition, configuration and standard protections are extremely important when it comes to
Bluetooth. Never leave your device in its default configuration - that is probably the easiest way
to allow a hacker to break into your device.

Also, take advantage of the security features that exist on your device. Is encryption optional?

If so, be sure to turn it on. Enable PINs when connecting to your device, and make sure you
choose a strong one that you have never used before.

Lastly - and perhaps the most obvious piece of advice - don’t download any suspicious files.

Though Bluetooth and BLE are increasingly adopted across all verticals, the security industry
has lagged behind.

Current network security tools focus almost exclusively on standard wired ethernet networks,
often ignoring wireless networks and Bluetooth devices.

Following Bluetooth best practices certainly helps, but businesses need to be aware and have
the visibility and control over the devices - all of the devices - that are in their environment.



About The Author

Dimitri Vlachos brings over 15 years of marketing leadership in both
startups and established corporations to Pwnie Express.

Most recently he served as VP of Marketing at ObserveIT where he was
responsible for scaling demand generation and establishing the company
as a leader in Insider Threat management.

Before ObserveIT, he served as VP of Marketing and Products at Riverbed
Technologies, where he was responsible for all marketing and products across the $250M
performance management business unit.

He has also held roles at Mazu Networks (acquired by Riverbed), Cisco, and BBN (acquired by
GTE).
Dimitri is a graduate of Bucknell University, and can be reached online at
[email protected], @DimitriVlachos, or http://www.pwnieexpress.com










33 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   28   29   30   31   32   33   34   35   36   37   38