Our quick and easy process allows you to start your data breach claim - sign-up today to claim potentially thousands in compensation.
We specialise in representing victims for data breach compensation claims.
Information on how we handle your data is available in our Privacy Policy.
Back in the days where data breaches and hacks were a new phenomenon, ‘air-gapping’ was a term which meant that it was nearly impossible for computers to be breached.
Air-gapping is a security measure that isolates a computer away from a network. By doing so, the computer stands alone. The security method was thought to be 100 per cent effective as it allows data contained within the computer to be safe from hacking.
In the growing age of data leaks and hacks, is this the only way we can truly protect ourselves?
Ultimately, an air-gapped computer is physically separated and can’t connect wirelessly or physically with other computers or network devices. But hacking has come a long way, and humans have intervened, and even hacking the safest cyber-security methods may not be impossible.
Air-gapped computers are apparently becoming easier to hack.
As simple as it sounds, they can be breached by attaching a USB stick into the machine. Of course, as with anything, it can be slightly more complicated than that…
A human could act as an intermediary i.e. gain the trust of an employee and then they could attach the USB stick, which could be in the form of a Wi-Fi dongle or a flash drive. Once the device has entered the machine, it’s effectively breached. This method just requires an employee to make a “rookie error” by allowing a USB device onto the system which can then exfiltrate the data.
A simple solution to this would be to limit access to the machine. Depending on how sensitive the data is, the machine may need to be locked away or secured in a separate room. If a separate room isn’t possible, the computer could be placed in an office of a trusted employee.
There is still a flaw in this technique: the issue comes that humans will interact with the machine. Air-gapping’s main problem is that, once multiple individuals have access to the machine, who becomes accountable in the event of a data breach? It also highlights whether employees are trusted to interact with the machine.
Aside from hacking into computers using a simple USB stick, air-gapped computers can be hacked using more complex strategies. Research suggests that the following methods have been successful:
These air-gapped breaches were tried and tested by cyber-security experts to raise awareness. However, they’re probably more air-gapped attacks in the pipeline that cyber-security experts aren’t even aware of.
Though there are multiple ways to secure air-gapped computers, they aren’t 100% hack-proof. Companies should consider air-gapping machines for sensitive data that doesn’t need a network signal. However, they mustn’t be complacent to think that this method will keep their data safe.
We specialise in representing victims for data breach compensation claims.
Information on how we handle your data is available in our Privacy Policy.
Speak to our team now for help and advice.
Fill out our quick claim form below and we’ll contact
you when you’re ready to talk to us.
All fields marked * are required.