{"id":6001,"date":"2025-12-16T14:22:15","date_gmt":"2025-12-16T07:22:15","guid":{"rendered":"https:\/\/interlink.net.id\/?p=6001"},"modified":"2025-12-16T14:22:15","modified_gmt":"2025-12-16T07:22:15","slug":"6-risks-of-relying-on-public-internet-for-business","status":"publish","type":"post","link":"https:\/\/interlink.net.id\/id\/6-risks-of-relying-on-public-internet-for-business\/","title":{"rendered":"6 Resiko Mengandalkan Internet Publik untuk Bisnis"},"content":{"rendered":"<p>If a company employee completes work outside of company premises and uses public internet, there\u2019s a potential risk of data breaches, especially if the company doesn\u2019t implement robust security measures. Therefore, companies must have additional safeguards in place to keep sensitive company information secure, wherever they are.<\/p>\n<p>Internet publik ini memang sangat beresiko sekali untuk perusahaan, ada banyak hal yang bisa dilakukan oleh hacker jika internet publik tersebut tidak aman. Berikut diantaranya:<\/p>\n<h2>1. Pencurian Identitas<\/h2>\n<p>Public internet users\u2019 information is highly vulnerable to public exposure if additional security layers aren\u2019t implemented. Hackers can access personal data, employment information, recently visited locations, account numbers, and more. Using this information, hackers can then plan more targeted attacks, such as phishing emails.<\/p>\n<h2>2. Pencurian Kredensial Penting<\/h2>\n<p>Bahaya yang kedua adalah pembobolan akun, ini sangat berbahaya sekali karena hacker langsung mendapatkan akses masuk. Dengan begini hacker akan mudah membobol data-data yang ada di perusahaan. Maka dari itu untuk mengantisipasi hal tersebut terjadi, pada saat menggunakan internet publik hindari login ke akun-akun yang berkaitan dengan bisnis dan perusahaan.<\/p>\n<h2>3. Terserang Malware<\/h2>\n<p>Dengan menggunakan internet publik maka akan memberikan jalan hacker untuk mengirim malware. Yang dimana salah satu metodenya adalah Evil Twin, metode yang dimana penyerang akan menggunakan Wi-Fi palsu untuk mengelabui target. Pada saat perangkat target tersambung ke Wi-Fi palsu tersebut, perangkat target akan di arahkan ke sebuah web situs phising.<\/p>\n<p>This is where the attacker inserts malware. If malware is already in place, it\u2019s highly likely to damage the system, or, even worse, the company could lose critical data.<\/p>\n<h2>4. Serangan Ransomware<\/h2>\n<p>At the end of 2023, the National Cyber \u200b\u200band Cybersecurity Agency (BSSN) reported that ransomware dominated cyberattacks in Indonesia, accounting for over 80%. While it\u2019s unknown how many ransomware attacks were caused by the public internet, it\u2019s highly likely.<\/p>\n<h2>5. Pembajakan DNS<\/h2>\n<p>This attack involves hackers exploiting the target\u2019s DNS requests to malicious websites. Hackers do this using malware or exploiting vulnerabilities in public internet routers. The goal of DNS hijacking is generally phishing, but certain parties may also aim to collect statistics.<\/p>\n<h2>6. Kehilangan Kontrol Penuh Perangkat<\/h2>\n<p>Ini adalah bahaya yang paling mengerikan karena jika karyawan perusahaan menggunakan internet publik maka bisa jadi akan kehilangan kontrol perangkat. Ada beberapa jenis malware yang bisa melakukan ini seperti salah satu contohnya spyware yaitu pegasus yang menyerang perangkat seluler. Malware jenis ini biasanya bersembunyi dalam iklan atau situs - situs web yang terinfeksi.<\/p>","protected":false},"excerpt":{"rendered":"<p>If a company employee completes work outside of company premises and uses public internet, there\u2019s a potential risk of data breaches, especially if the company doesn\u2019t implement robust security measures. Therefore, companies must have additional safeguards in place to keep sensitive company information secure, wherever they are. This public internet is indeed very risky for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6002,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[97,36,96,95,94],"class_list":["post-6001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge","tag-danger","tag-internet","tag-malware","tag-public","tag-wifi"],"jetpack_featured_media_url":"https:\/\/interlink.net.id\/wp-content\/uploads\/2025\/12\/public-wifi.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/posts\/6001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/comments?post=6001"}],"version-history":[{"count":1,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/posts\/6001\/revisions"}],"predecessor-version":[{"id":6003,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/posts\/6001\/revisions\/6003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/media\/6002"}],"wp:attachment":[{"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/media?parent=6001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/categories?post=6001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interlink.net.id\/id\/wp-json\/wp\/v2\/tags?post=6001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}