Lately there is a lot in the news about cyber security. Millions have been affected by breeches at
major companies. But hackers aren’t
just after big companies. If you have
any personal or business information on a computer - and most of us do - you
are vulnerable too.
Marc Beaart, Assistant Head Deputy for the Los Angeles District
Attorney’s Head Tech Crimes Division, recently spoke to a group of
business executives about cyber threats and steps we should take to keep
information safe, or at least safer, in a quickly evolving hacking world.
It helps to know some terminology. Malware is the overarching term describing
malicious software that is intended to disrupt a computer and perform actions
without the owner’s permission. Computer viruses and worms are
self-replicating programs that install themselves without permission. Viruses need another program to act as host
while worms are self-contained. Both can corrupt your data or steal your
personal information.
Ransomware is used by criminals to lock a computer and then
demand payment in return for unlocking it.
The extortion message may look official such as posing as a government
agency requiring payment of a fine. I
was surprised to learn that businesses often pay the ransom since it can be
cheaper than ridding the computer of the ransomware and disrupting a company’s
operations. But if you do pay, don’t
be surprised if the hacker returns for another bite at the apple.
A Trojan horse is a stealthy malware. It is disguised as a safe program offering to
help if you will just hit on the link provided and then give some personal
information like an account number or passcode. Keyloggers record your keystrokes and can then
steal sensitive information. And a rootkit infiltrates your operating system so
it can hide other malware.
Cyber-attacks can come from an email or by connecting to the
internet. Most photocopy machines now send
faxes. That means they connect to the
internet and are susceptible to cyber-attacks.
Any machine that shares data or other files through the internet can be
attached whether it is in a lab, a processing facility or an office.
There are things you can do to protect your personal information
and your business. First, understand how
hackers can gain access to your information.
Approximately 80 percent of breeches occur from inside an
organization. Sometimes the breech is
intentional but more often it is accidental.
Second, carefully review any link before connecting. If it looks strange or doesn’t
match the name of the file or company you are trying to access, don’t
use it. Call the reported sender and ask
if the email or link is from them.
Third, free memory sticks are a frequently used method of
marketing or sharing data. They are also
an easy way for malware to access your computer. Never use a memory stick unless you are 100
percent sure of the source. Free game
downloads are another emerging technique for getting into your computer. If you hit that link for the free game, you
may get much more than you expected or wanted
Recently, an advertisement for stylish women’s
shoes took over the San Gabriel Valley Economic Partnership’s
website. I received a call from a
colleague who was trying to find information about one of our events. We aren’t sure how long the
bogus ad controlled our site. Remember
to check your website regularly. We do so now.
The best protection is a good password. Memorize it.
Don’t keep it under your computer. Don’t share it with vendors. Don’t use words in the dictionary and
please don’t use 123456.
Everyone knows that one.
No comments:
Post a Comment