Oct 7, 2024

Dangers of the Internet

If your company network is connected to the Internet, it has already been hacked or it will be...

In today's interconnected world, there's an uncomfortable truth that many companies aren't ready to face: If your network is connected to the Internet, it has either already been hacked or it will be. Even more unsettling is the reality that there's almost nothing you can do to completely prevent it – even if you follow every security recommendation from router manufacturers to the letter.

Why Even the Best Get Hacked

Consider this sobering fact: The NSA, CIA, FBI, NASA, Microsoft, Cisco, Google, Amazon, and the Pentagon have all experienced security breaches. These organizations employ thousands of security specialists and have billions of dollars dedicated to cybersecurity. What chance does the average company have if they can't prevent breaches?

Recent history provides plenty of cautionary tales. Take Capital One's breach, where a single misconfigured router in their vast network led to over 100 million compromised accounts. Or consider the "BlackPOS" hack that affected Home Depot and Target through a third-party vendor, continuing for months despite having state-of-the-art security measures in place.

Even more recently, in October 2023, an estimated 181,000 front-line Cisco routers were compromised due to a single vulnerability (CVE-2023-20273). This wasn't a case of poor configuration – it was a fundamental security flaw that affected even perfectly maintained systems.

The Myth of Router Security

Here's an inconvenient truth: Routers and firewalls alone cannot protect you. While router manufacturers grow rich from massive hardware purchases, these devices offer surprisingly little protection. When your critical data is connected to the internet, it's potentially accessible to:

  • State-sponsored hackers from countries like North Korea, Russia, and China

  • Professional hacker cartels

  • Countless independent bad actors

These entities invest significant resources in finding vulnerabilities, purchasing and dissecting hardware, and maintaining teams dedicated to breaching security systems.

A Different Approach to Security

It's time for companies to think differently about data security. Here's what needs to change:

1. Rethink Internet Connectivity

Not everything needs to be connected to the internet. In fact, many things should never be connected. Take the recent example of a county government ransomware attack where:

  • Property deed records were encrypted, including backups (which should never have been online)

  • Personnel information, including bank accounts and medical records, was compromised

2. Implement Physical Security Measures

For truly sensitive data, consider creating "sterile rooms" with strict access controls:

  • No personal devices allowed

  • No external storage devices

  • Zero tolerance for security violations

  • Limited access to essential personnel only

3. Insurance-Driven Change

Just as homeowner's insurance drives safety improvements through incentives, cyber insurance could play a crucial role in improving corporate security practices. However, many insurance companies are already pulling back from cyber coverage due to the massive risks involved.

4. Establish Real Standards

We need industry-wide security standards similar to those in other fields:

  • Clear, specific guidelines (like the National Electrical Code for construction)

  • Regular audits and inspections

  • Standardized backup procedures

  • Defined security protocols for different types of data

The Path Forward

The digital revolution has reached a critical turning point. Companies can no longer afford to be cavalier about data security or rely on insurance to bail them out after a breach. Class action lawsuits totaling billions of dollars are becoming commonplace, and many businesses won't survive the financial impact of a major breach.

The solution isn't buying more routers – it's fundamentally rethinking what needs to be connected to the internet and what doesn't. Companies need to:

  • Conduct thorough risk assessments

  • Implement proper physical security measures

  • Establish clear security standards

  • Consider offline alternatives for sensitive data storage

  • Regular security audits and updates

The time for change is now. As cyber threats continue to evolve, In8Vue has developed a proprietary system that enables essential business operations – from video conferencing to point-of-sale transactions – to operate completely outside traditional internet vulnerabilities. This approach finally offers businesses a way to maintain modern connectivity without compromising security.

Contact In8Vue today.


¹HIPAA, requires that conversations and transmission of private medical records be controlled with secure endpoints authenticated and encryption. In8Vue’s private network is in full compliance with this standard with our Zero Trust Network Architecture. Many say they can meet this requirement but can only verify their endpoint and trust that the distant ends have met the standards.

²Zero Trust Network Architecture, NIST 800-207, outlines the design criteria for a network you can trust.  They outline methods for authentication of end points and encryption. This can be done manually with authentication code for each call or automatically by the system on private networks.  In8Vue is in full compliance with the criteria with a private, double encrypted network with known end points.  Our system automatically authenticates your endpoints when you make a call, and if the equipment does not authenticate the system will not connect and a trouble notification is made to both you and In8Vue for correction.



© 2024 by In8Vue. All Rights Reserved.

¹HIPAA, requires that conversations and transmission of private medical records be controlled with secure endpoints authenticated and encryption. In8Vue’s private network is in full compliance with this standard with our Zero Trust Network Architecture. Many say they can meet this requirement but can only verify their endpoint and trust that the distant ends have met the standards.

²Zero Trust Network Architecture, NIST 800-207, outlines the design criteria for a network you can trust.  They outline methods for authentication of end points and encryption. This can be done manually with authentication code for each call or automatically by the system on private networks.  In8Vue is in full compliance with the criteria with a private, double encrypted network with known end points.  Our system automatically authenticates your endpoints when you make a call, and if the equipment does not authenticate the system will not connect and a trouble notification is made to both you and In8Vue for correction.



© 2024 by In8Vue. All Rights Reserved.

¹HIPAA, requires that conversations and transmission of private medical records be controlled with secure endpoints authenticated and encryption. In8Vue’s private network is in full compliance with this standard with our Zero Trust Network Architecture. Many say they can meet this requirement but can only verify their endpoint and trust that the distant ends have met the standards.

²Zero Trust Network Architecture, NIST 800-207, outlines the design criteria for a network you can trust.  They outline methods for authentication of end points and encryption. This can be done manually with authentication code for each call or automatically by the system on private networks.  In8Vue is in full compliance with the criteria with a private, double encrypted network with known end points.  Our system automatically authenticates your endpoints when you make a call, and if the equipment does not authenticate the system will not connect and a trouble notification is made to both you and In8Vue for correction.



© 2024 by In8Vue. All Rights Reserved.

¹HIPAA, requires that conversations and transmission of private medical records be controlled with secure endpoints authenticated and encryption. In8Vue’s private network is in full compliance with this standard with our Zero Trust Network Architecture. Many say they can meet this requirement but can only verify their endpoint and trust that the distant ends have met the standards.

²Zero Trust Network Architecture, NIST 800-207, outlines the design criteria for a network you can trust.  They outline methods for authentication of end points and encryption. This can be done manually with authentication code for each call or automatically by the system on private networks.  In8Vue is in full compliance with the criteria with a private, double encrypted network with known end points.  Our system automatically authenticates your endpoints when you make a call, and if the equipment does not authenticate the system will not connect and a trouble notification is made to both you and In8Vue for correction.



© 2024 by In8Vue. All Rights Reserved.