Hacking & Cybersecurity

The advancement over the last 20 years has opened up a lot for hackers, viruses trojan horses and other computer security breaches, to put it simply as soon as you’re connected to the world wide web you are at risk; regardless at how many antivirus programs, firewalls and any other security features that are installed on the system. The term “Hacker” is the source of a lot of controversies today, as it can be used in lots of different contexts and can be confusing to many people especially to the ones that don’t know or have little knowledge about what about what happens when we connect up to the WWW. It is hard to identify a hacker as they can enter your system in many different ways such as downloadable content, visiting a website or simply by sending and receiving e-mail. More so in this day in age where we are always connected my mobile devices and automation.

Many types of hackers have various types of intentions. I will explain some here:

1.White hat hackers: These are the good guys who hack for a good reason, they identify the loopholes and research security, which may become a problem for an organisation down the line

2.Black hat hackers: These guys are evil their methodology violate every definition that isn’t good and breaks every rule in the book. They hack for money an personal gain.

3.Grey hat hackers: the intentions of these guys, is to show loopholes on the internets and suggest how to rectify those issue for a price.

Online banking: One tip is always to enter your password using another text editor and then copying and pasting it into the browser; this way it eliminates keystroke loggers in which a hacker can gain control of in your system. Especially in public places when you’re utilising their WiFI.

Smartphones:

Almost everyone has a smartphone, and unfortunately these are highly targeted; however there are many methods below, I will touch on three and explain how you can eliminate your phone getting hacked today:

1. Strong passwords – you’ve probably heard this a thousand time before but is effective. Don’t use weak passwords or using the same passwords for multiple accounts, that way if a hacker does get your passwords the other account is still safe. And don’t just stick the minimum password require either – stronger + use of numbers, capitalisation = strong protection. Computers are good at guessing passwords, and some clusters are capable of guessing up to 33 trillion passwords per second (done by supercomputers)

2. Set up two-factor authentication: Just like the name implies, this makes it harder for a hacker to get into your account. With two way authentication this allows you to have a more of a piece of mind but again this has loopholes as well as the hacker can call the service, pretending to be you, it just depends how well it is set up. (One tip: Have a pin code)

3. Be smart about WiFi networks; generally, I advise not connecting to any WiFi networks! And if you absolutely have to make sure you use a VPN (Virtual Private Network) this goes for coffee shops, airports and every public place to put it bluntly.

The three main Cybersecurity trends in 2019 are:

1. Internet is going dark: this is all to do with encryption, artificial intelligence and machine learning. This allows to spot unusual animalities in big volumes of traffic.

2.Internet of things: This is to do with big organisations which involved going beyond devices such as laptops, desktops, tablets and smartphones, to connect and exchange data.

3. Cloud insecurity: This is a big topic to cover; but in short there are protocols which should be followed by the provider and the end user to eliminate the misuse, leakage or loss of data

At FrostByte Computer Services we take security very seriously and will advise what needs to be performed if you have been hacked; depending on the security breach we may also be able to recover data (Always perform a data backup and even a secondary backup to store off-site) and again we can help with this. It’s also a good idea to find out what will be the best way to protect yourself for the next following months. Feel free to give us a call or text today.

 

Images supplied by:
Thedigitalartist / pixabay
kalhh /pixabay