Thursday, June 4, 2015

Watch out for online security breaches

Lately there is a lot in the news about cyber security.  Millions have been affected by breeches at major companies.  But hackers aren’t just after big companies.   If you have any personal or business information on a computer - and most of us do - you are vulnerable too. 

Marc Beaart, Assistant Head Deputy for the Los Angeles District Attorney’s Head Tech Crimes Division, recently spoke to a group of business executives about cyber threats and steps we should take to keep information safe, or at least safer, in a quickly evolving hacking world.

It helps to know some terminology.  Malware is the overarching term describing malicious software that is intended to disrupt a computer and perform actions without the owner’s permission.  Computer viruses and worms are self-replicating programs that install themselves without permission.  Viruses need another program to act as host while worms are self-contained. Both can corrupt your data or steal your personal information.

Ransomware is used by criminals to lock a computer and then demand payment in return for unlocking it.  The extortion message may look official such as posing as a government agency requiring payment of a fine.  I was surprised to learn that businesses often pay the ransom since it can be cheaper than ridding the computer of the ransomware and disrupting a company’s operations.  But if you do pay, don’t be surprised if the hacker returns for another bite at the apple.

A Trojan horse is a stealthy malware.  It is disguised as a safe program offering to help if you will just hit on the link provided and then give some personal information like an account number or passcode.  Keyloggers record your keystrokes and can then steal sensitive information. And a rootkit infiltrates your operating system so it can hide other malware.

Cyber-attacks can come from an email or by connecting to the internet.  Most photocopy machines now send faxes.  That means they connect to the internet and are susceptible to cyber-attacks.  Any machine that shares data or other files through the internet can be attached whether it is in a lab, a processing facility or an office.

There are things you can do to protect your personal information and your business.  First, understand how hackers can gain access to your information.   Approximately 80 percent of breeches occur from inside an organization.  Sometimes the breech is intentional but more often it is accidental.

Second, carefully review any link before connecting.   If it looks strange or doesn’t match the name of the file or company you are trying to access, don’t use it.  Call the reported sender and ask if the email or link is from them.

Third, free memory sticks are a frequently used method of marketing or sharing data.  They are also an easy way for malware to access your computer.  Never use a memory stick unless you are 100 percent sure of the source.  Free game downloads are another emerging technique for getting into your computer.  If you hit that link for the free game, you may get much more than you expected or wanted

Recently, an advertisement for stylish women’s shoes took over the San Gabriel Valley Economic Partnership’s website.  I received a call from a colleague who was trying to find information about one of our events.  We aren’t sure how long the bogus ad controlled our site.  Remember to check your website regularly. We do so now.


The best protection is a good password.  Memorize it.  Don’t keep it under your computer.  Don’t share it with vendors.  Don’t use words in the dictionary and please don’t use 123456.   Everyone knows that one.

No comments:

Post a Comment