IT

Are you a target?Everybody is a target, so the answer is yes! Although more often it will be accidental rather than personal.

For example, if you used the same password in more than one site and it is subsequently stolen and revealed or sold on by a hacker, it may be used elsewhere to your detriment. This happens often enough to make it worth their while.

It’s about the money

The more they try, the more money they can make. Here are some ways they can use you to make money:

  • Creating a credit card in your name and you get the bill
  • Accessing your computer to use it to hack others
  • Buying from your online shopping accounts through a hacked site’s data (possibly because you used the same login and password)
  • Hacking your social media accounts and selling them on

Personal, targeted attacks are also made on specific companies, so you could be a target depending on where you work and your job title. Phishing is one of the most used methods of targeted attacks. If they get access because of your click on a phishing email, they will work their way through your co-workers and IT systems to gain access to company systems.

Malware and anti-virus isn’t enough

Anti-virus and malware solutions don’t always work because the criminals are clever and new malware is invented daily so they are always one step ahead. It takes a little time for the protection software updates to catch up. Additionally, filters don’t detect all phishing emails.

Multi-channel

Criminals can also use the phone. You’ve probably received the “This is Microsoft calling, you have a virus in your system” phone call. Microsoft received over 7,000 victim reports from more than 15 countries who’ve been scammed by these calls. Fortunately Microsoft closed down a number of these fake call centres last year.

What to do?

You are your own best defence and critical in your organisation’s defence. Be careful and use common sense. If you get a suspicious email or internal message that is urgent then don’t open it. Let your IT manager know so that they can check it out and make sure it doesn’t spread further.

Watch the video to see how easy it is. Can you tell how the hackers got access?

Always be cyber-aware and don’t reuse the same password.

By John Casey of Trilogy Technologies.