Can You Avoid Being Hacked?

May 7, 2014 at 2:41 AM

The recent customer hacking that retail giant Target experienced, along with continuing updates on similar situations from Neiman Marcus and many others, only serves to highlight the challenges that all retailers, large and small, face when trying to protect their customers’ data.

The Secret Service, charged with safeguarding the nation’s financial infrastructure, says that unfortunately, offense outpaces the defense today, and that all that most companies can really do is hope there is early detection of a breach and subsequently swift action to repair it. These observations were made by security expert Shawn Henry in an interview with CNN.

But it is not only businesses that have to worry about hacking. Individuals like you are just as vulnerable!

Sign Up for E-News

So, what can you do? The first, and most obvious, answer to this question is that you need to be aware and alert. As hackers work to get a foothold into your network, you must be as vigilant regarding your electronic world as you are safeguarding the tangible items, such as credit and debit cards, that are typically found in your wallet. Remember that all scams rely on your acting quickly, before thinking through all the options. If you pause and consider the offer and the validity of it, you may be able to head off the problem before it occurs.

Today’s hackers are sophisticated and innovative and have access to complex malicious software (malware) that they can use to attack your system, but if you are aware of what is going on, you are on a much better position to protect yourself and key pieces of your identity, such as your social security number, bank account or credit card numbers.

So what are some of the most successful scams that are being used today?

1. Phishing. In this scenario you receive an email saying that a Nigerian prince needs your help transferring millions of dollars out of the country and that you can earn a significant percentage by helping facilitate the transaction. Or you may be told you have won a contest, or you may receive an announcement that you can make a profit by shipping goods to someone out of the country.  The common thread in all of these situations is that you are asked to supply personal or banking information, which goes directly to the hackers to use against you as they infiltrate your files.

2. Trojan horse. Since the goal of many hackers is to slip a virus onto your computer, they often disguise the virus as something harmless or familiar. In this scenario, you receive an email that looks like it is from a legitimate shipping service, bank or some other reputable company that you recognize. They invite you to open an attachment, and once you have done so, the virus is installed before you can stop it from penetrating your computer. Again, using common sense is one of the best ways to defend your identity. Even though the email may look exactly like it came from your bank – complete with official logo – you know that your bank would never reach out to you asking for personal, confidential information by email! If you really think it is legitimate, call the bank and ask.

3. Drive-by downloads. Hackers also use this process to embed a virus in your computer. They establish a website for you to visit, sending you the URL through a phishing email or even a Facebook posting. Malicious codes can even be embedded into legitimate websites and once you click, the code scans your computer for a security “hole” that can be breached to provide an entrance into your system. To avoid this situation, be sure to keep your programs up to date by downloading the monthly Microsoft updates for Windows and Internet Explorer that are designed to close these types of security gaps. Adobe Flash and Adobe Reader along with Oracles Java also must be update regularly because old versions can be quickly compromised.

4. Bypassing passwords. Instead of trying to “guess” your password, hackers may go around the password challenge by obtaining the information through a virus they have installed on your computer, or from a website you use, or even by accessing data from a security breach at a company where you do business. Smart hackers who want to get into your files may even be able to answer your security question. This is because you, unwittingly, supply the details. For example, if you have the name of your dog on Facebook, and “your dog’s name” is your security question, a hacker can easily fill in the blanks.

5. Using open W-Fi. If your home Wi-Fi is not encrypted, anyone can connect to your network from outside, leaving an open door for hackers to see and record all your transactions.

Given these activities, there are some things you can do to protect yourself:

  • First of all, secure your home network. The details are most likely in your Wi-Fi router’s manual.
  • Secondly, have a separate password for each account so that if one is compromised, they all do not fall victim at once. To keep all your passwords straight, it is suggested you use a third party software program called a ‘password manager’ that can create and store passwords for you.
  • Thirdly, if you are creating your own passwords, make them difficult (and not easily guessed at) by creating a combination of numbers, symbols, special characters and letters. Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable to criminals, so it’s important to make your passwords strong. Strong passwords are phrases (or sentences) at least eight characters long—longer is better—that include at least three of the following: uppercase and lowercase letters, numerals, punctuation marks, and symbols. Avoid kids’ and pets’ names and don’t share passwords with others or store them on the device they’re designed to protect.
  • Fourth, consider sharing less on Facebook, LinkedIn and other public sites. Without even knowing it, you are creating opportunities for hackers by telling them so much about yourself.
  • Lastly, understanding that hacking can still occur, don’t forget to back up your data. Use an external hard drive or an online service, but leverage some option to ensure that if your smartphone is stolen or your computer is infiltrated, you do not lose precious photos or other irreplaceable data.  

In conclusion, the most important thing you can do is to be careful and thoughtful, think twice before your respond to any email, and protect your data with strong passwords.

Information for this article was researched at www.foxnews.com – Five Ways Hackers Attack You and How to Counter Them; www.npr.org – Five Wys to Avoid Being Hacked by Sonari Glinton; www. Thelead.blogs.cnn.com – Expert: Companies Like Target Can’t Prevent Hackers and Microsoft.com – Creating Strong Passwords.

This column will provide business advice and new  perspectives on business news, emerging trends and traditional topics impacting individuals, family businesses and professional service providers across the tri-state area.

The opinions expressed herein are the writer's alone, and do not reflect the opinions of TAPinto.net or anyone who works for TAPinto.net. TAPinto.net is not responsible for the accuracy of any of the information supplied by the writer.

TAP Into Another Town's News:

TAP Into Another Town's News:

Sign Up for E-News

Livingston

Livingston Bowling's Allen Cai Named Livingston Athlete of the Week

January 15, 2017

LIVINGSTON, NJ — Livingston High School bowling’s walk-on senior Allen Cai is named Dr. Michael Rieber’s Livingston Athlete of the Week for establishing himself as one of the best bowlers in the SEC's Colonial Division.

According to bowling coach Griff Hughes, Cai currently holds a 205 average, which is the third-best average in the division. He has also bowled ...

Update: Two Attempted Abductions Reported in Montclair

January 19, 2017

MONTCLAIR, NJ - Two reports of attempted abduction have been reported in Montclair on Tuesday.

Surrounding towns have been notified. Information will be provided as it becomes available.  

Update:  After TAPinto Montclair first broke this news story, law enforcement officials have confirmed this report and released a sketch of the ...

Upcoming Events

Carousel_image_39f41190bb6dffdc4f57_meadowbrook_open_house

Sun, January 22, 11:00 AM

Meadowbrook Country Day Camp, Long Valley

Meadowbrook Country Day Camp Open House January ...

Education Sports

Carousel_image_863af7c155c26548b26c_library

Tue, January 24, 7:30 PM

Livingston Public Library, Livingston

Livingston Public Library Invites Public to Free ...

Arts & Entertainment

Carousel_image_4d80854f4b5c252ca5b6_supernet

Wed, January 25, 6:30 PM

The Newark Club - Metropolitan Room, Newark

ACG NJ Joint Super Networking Party, January 25th ...

Arts & Entertainment Business & Finance Food & Drink

Women's March on Washington: Why, and Why Now

January 19, 2017

As Donald Trump’s inauguration draws near, a number of groups are planning various events and rallies – perhaps most notably, the Women’s March on Washington. I have read a number of opinion pieces and spoken to many people about the March, and several questions and criticisms seem to consistently arise. I would like to address some two of the major themes.

(Q) The election ...

Newark Preservation & Landmarks Committee President to Address Livingston Historical Society, January 23

January 19, 2017

LIVINGSTON, NJ — On the heels of the 2016 celebration of the 350th anniversary of the founding of Newark, NJ, Elizabeth R. Del Tufo, one of the city's best-known civic activists and ambassadors, will give a presentation at the Livingston Historical Society meeting on Monday at the Livingston Senior/Community Center.

Refreshments will be served at 7 p.m. and the program ...

Andy’s Family Music Showcases Shayne Apple on Guitar

LIVINGSTON, NJ — Andy’s Family Music Center of Livingston is proud to highlight Shayne Apple, a fifth grader at Riker Hill Elementary School with an aptitude for drums.

Shayne also plays trombone in the school band and participates in the school choir. According to his mother, Sharon, Shayne was inspired to pick up guitar not long after his father decided to learn the same ...

Preparing for the Ski Season

It’s all about physical fitness. It’s what allows elite skiers to compete in the most extreme conditions and at their highest levels.  An obvious way to ensure your enjoyment and performance is with the appropriate level of strength, endurance and conditioning.

A balanced program focusing on aerobic fitness, strength training, core and balance is the way to get the most out of ...

Man vs. Waze

A lot of strange cars are traveling through my quiet neighborhood these days.  They are not driven by my neighbors.  Some mornings I even have trouble getting out of my driveway.  

Waze.

Ever since bridge repair closed a major thoroughfare near my house, the traffic on my sleepy street has increased dramatically.  And it is not by accident that commuters have figured out ...