Maximize your business potential and open new revenue possibilities with start-to-finish production print and wide format solutions from EO Johnson and Standard Dynamics finishing solutions.
You demand multifunction copiers that are easy to use and cost-efficient. With thorough training and prompt service response, you’ll find EO Johnson’s copiers are as dependable as you are.
Locknet® Managed IT offers security, network defense, backup and managed services to help businesses in Wisconsin, Minnesota, and Iowa develop successful technology strategies, whether you’re small to medium sized, regulated, non-regulated, or have little to no IT staff.
Our solutions help you with a specific document need or work together for a powerful combination to increase efficiency and productivity.
With more than 85 technicians throughout our service areas of Wisconsin, Minnesota, and Northern Iowa, we have someone close by to help. The average response time for a technician to arrive at your site is under 4 hours.
For Copier and Printer Service
844.342.5365
For Production Print and Finishing
844.236.7567
EO Johnson Locknet® Managed IT Services
877.408.1656
Software Solutions
844.304.8791
Maximize your business potential and open new revenue possibilities with start-to-finish production print and wide format solutions from EO Johnson and Standard Dynamics finishing solutions.
You demand multifunction copiers that are easy to use and cost-efficient. With thorough training and prompt service response, you’ll find EO Johnson’s copiers are as dependable as you are.
Locknet® Managed IT offers security, network defense, backup, and managed services to help businesses in Wisconsin, Minnesota, and Iowa develop successful technology strategies, whether you’re small to medium-sized, regulated, non-regulated, or have little to no IT staff.
Our solutions help you with a specific document need or work together for a powerful combination to increase efficiency and productivity.
With more than 85 technicians throughout our service areas of Wisconsin, Minnesota, and northern Iowa, we have someone close by to help. The average response time for a technician to arrive at your site is under 4 hours.
For Copier and Printer Service
844.342.5365
For Production Print and Finishing
844.236.7567
EO Johnson Locknet® Managed IT Services
877.408.1656
Software Solutions
844.304.8791
4 min read
A few weeks ago, I stepped off a plane in Las Vegas. I barely noticed the 107-degree heat. The real “hotbed” that day was DefCon 25, the largest international hacker conference in the world.
Preregistering was not allowed. Identities of 25,000 attendees were kept anonymous. Warnings from conference organizers said, “Anything that can be hacked will be hacked, so trust no one.” I listened.
My laptop stayed home and my phone stayed off Wi-Fi. In the conference area, it would remain in airplane mode with everything disabled.
While in my room, only my tablet was used to access the internet. Though the hotel Wi-Fi was “supposed” to be a safe zone from hacking, indications came early that my tablet may have been compromised.
Programs started crashing and programs that rarely updated were automatically being updated. This was only the first hour, red flags were already being raised. It was going to be an interesting weekend.
Why would EO Johnson Locknet® send a Senior Engineer to attend this event?
Security professionals, like me, are more like “gatecrashers” at DefCon—grabbing front row seats to watch the hackers gorge on all things hackable and for us to learn how to prevent them from doing this.
And learn I did (some specific lessons later). What was it like?
A hackers’ conference held in a Vegas casino brought odd optics. It was “Driving Miss Daisy” meets “The Matrix”. People who could barely turn on computers were mingling with hackers who could break into their bank accounts within minutes.
It was a competitive atmosphere with lock-picking contests, cipher challenges, and technical pranks. This is my fourth DefCon and I can safely say, hackers come in all personality types.
For some, it’s a hobby. They get a thrill out of the challenge and don’t cross the line to cybercrime.
Others have a much darker side and use their “talents” to attack countries, businesses and institutions—even putting lives in danger.
Last spring’s ransomware attack, coined Wannacry, shut down European hospitals creating serious concerns for patients.
Petya, the latest malware attack that affected computers in U.S. hospitals, continues to be a growing problem with hacking of vulnerable medical devices.
Peeling back the DefCon onion isn’t easy. Take-aways are buried in a world of acronyms and mind-numbing tech talk.
Workshops and “Villages” (real-time hacking events) were mostly focused on social engineering, hardware exploits and physical security. Here are a few highlights that created a lot of discussion among the attendees.
One speaker talked about his efforts to exploit technologies that impact the physical world like Control Systems typically used in industries such as electrical, oil, gas and data.
To hostile governments, these are the “holy grail” of cyberwar because of the widespread damage to the nation’s grid and infrastructure—resulting in catastrophic damage to human life without firing a shot.
Off the security radar for many businesses, but on our radar as a Managed Security Service Provider (MSSP) for hundreds of companies, are “Internet of things” (IoT) devices like refrigerators, thermostats, lights, smartwatches, smart cars and Echo technology.
DefCon hackers use these commonly placed “things” to show how easy they are to breach. Some were hacked in a matter of three minutes allowing hackers to steal data, conduct espionage on enterprise activities, or even cause physical damage.”
In other demonstrations, vehicles with smart technology were hacked. Also, security flaws were exploited in computers by hijacking the wireless mouse.
(A hacker needs to be about 656 ft. away from the computer to pull off taking control of your mouse—so your home or office may be safe. Public areas like coffee shops and airports put you more at risk.)
New smartphone options were also on view. Attackers remotely accessed smart phones by sending specially crafted wireless packets to the victim’s phone. It tripped the vulnerability and gave the attacker full control of the device.
This vulnerability also displayed a self-replicating worm that infected “one” smartphone—and went on to repeat attacks on other vulnerable smartphones.
(Tip: Keep your smartphone up to date and avoid joining open public wifi networks.) There was a flaw in the wireless firmware. There has since been an over the air patch issued to correct the issue.
Hackers aren’t foolproof. DefCon coughs up plenty of their vulnerabilities and allows us to forecast future trends to adjust our security measures to guard against attacks.
Useful information gained from DefCon 25 included:
Sitting in countless hours of presentations and workshops confirmed, once again, my professional security experience at EO Johnson that hackers look for vulnerabilities across your entire business.
There are many ways to get “inside” your system and today, everyone in your organization should be part of your security team.
When EO Johnson works with customers, our focus is on your whole company and all positions inside.
If you’re not confident in your current security posture, there are companies like ours strategically positioned to help reduce your threat landscape and make sure you’re prepared to handle any new threats as they’re discovered.
As I clean my devices used at DefCon, I can assure you hackers may be closer than you think.
CUSTOMER CARE CENTER
For general supplies and information
844.365.4968
PRINT IMAGE SUPPORT CENTER
Support for copier/printer service related issues
844.342.5365
LOCKNET® MANAGED IT SERVICES
Support for our Locknet Managed IT Services
877.408.1656
DOCUMENT AND SOFTWARE SOLUTIONS SUPPORT
844.304.8791
You are now leaving eojohnson.com. Please check the privacy policy of the site you are visiting.
No Comments Yet
Let us know what you think