Drones Used as Source to Infiltrate Corporate Networks

Robinson+Cole Data Privacy + Security Insider
Contact

Drones are being used by nefarious actors to spy on networks, intercept data, disrupt communications and hack into servers more than ever. In fact, drones are becoming a more and more prevalent source for infiltrating corporate networks each day. Few protections exist for businesses to prevent drone intrusions, but before businesses can even mitigate risks posed by drones, the business must first gain situational awareness and determine how many drones are entering their airspace. While businesses invest financial resources to secure their property and protect their employee, customer and proprietary data from hackers, it is important to add customized protections to prevent drones from infiltrating your business’s airspace and gaining unwelcomed access to data.

When implementing a security program for your business, you should now also consider threats from drones in and around your business’s airspace; drones are:

  • Identifying and Following Targets: Drones are observing security gaps and detecting and manipulating vulnerable parts of networks.
  • Spying on Operations: Drones are evading security teams, capturing footage and using high-gain microphones to obtain spoken information as well.
  • Surreptitiously Exfiltration of Data: Drones are detecting vulnerabilities in air-gapped computers installed with malware. Once a computer is infected, a drone with a camera can be deployed to hover outside a window, near the hardware.
  • Snooping and Infiltrating Networks: Drones are using sniffing devices or transceivers to monitor employees and security movement, and then hack into wireless activity and intercept and log data.

Drone detection technology can be used to diagnose airspace activity, and therefore, help to secure and protect business operations and data against drone threats. Using detection technology can aid businesses in adjusting ground patrol or security, determine vulnerable areas and analyze the severity of threats. The idea behind this technology is that the more proactive measures a business takes, the better it will be able to build security measures and strengthen existing security measures and programs.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider
Contact
more
less

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.