P2P exposes you to attack from hackers looking to filch files. Here's how to avoid a swap-and-run.
"Dad, mind if i borrow the keys to the network tonight? I'll be real careful. I'm just going to swap files with millions of strangers, maybe accidentally download a Trojan or two, and leave a truck-sized hole in our firewall."
It's rarely put to you that way-at home or at work. But that's the likely outcome if an employee installs a peer-to-peer (P2P) file-swapping program on one of your PCs. Hackers may be already using your network as if it were their own. In fact, developers of these programs may be using your computing resources as their own as well.
Continue reading this article - and everything on Entrepreneur!
We make some of our best content available to Entrepreneur subscribers only. Become a subscriber for just $5 to get an ad-free experience, exclusive access to premium content like this, and unlock special discounts.
Entrepreneur Editors' Picks
Crypto Doesn't Have to Be Serious. Just Ask This Comedian Who Organized a Conference About Failure in the Industry.
Want to Succeed? Turn Your Fixed Mindset Into a Growth Mindset.
Google's CEO Is Asking Employees 3 Simple Questions to Boost Productivity
'Greatest Storyteller Wins.' Katy Perry on the Surprising Link Between Pop Stardom and Entrepreneurship.
The 5 Personalities You Meet in a Coworking Space
'Man's Best Friend' — and Investment: The Thriving Industry of Pet-Related Franchising