P2P exposes you to attack from hackers looking to filch files. Here's how to avoid a swap-and-run.
Opinions expressed by Entrepreneur contributors are their own.
"Dad, mind if i borrow the keys to the network tonight? I'll be real careful. I'm just going to swap files with millions of strangers, maybe accidentally download a Trojan or two, and leave a truck-sized hole in our firewall."
It's rarely put to you that way-at home or at work. But that's the likely outcome if an employee installs a peer-to-peer (P2P) file-swapping program on one of your PCs. Hackers may be already using your network as if it were their own. In fact, developers of these programs may be using your computing resources as their own as well.
Continue reading this article — and all of our other premium content with Entrepreneur+
For just $5, you can get unlimited access to all Entrepreneur’s premium content. You’ll find:
- Digestible insight on how to be a better entrepreneur and leader
- Lessons for starting and growing a business from our expert network of CEOs and founders
- Meaningful content to help you make sharper decisions
- Business and life hacks to help you stay ahead of the curve