Stop Helping Cybercriminals Steal Your Info
We all face computer security threats on a daily basis. Some attempts by cybercriminals are outright obvious! But, others, admittedly are ingenious, sneaky (see (2) below – that is a new one for me) and can literally put you out of business. An IT instructor I had a few weeks ago said he could hack our hotel’s Wi-Fi and be on our cell phones in 2-3 minutes. He said if he was really good it could be done in 30 seconds. Ouch! Also, too many people use passwords that are simply too short and too easy to guess. Please read on…
-Mark C Bradstreet, CPA
“When you take a moment to think about the various data breaches and identity theft scams that have occurred over the past few years – from Equifax to WannaCry – there tends to be a common theme: These wounds are self-inflicted.
Because we face data security threats every day, it helps to know the most common tactics cybercriminals use and how to prevent falling victim to them.
(1) Spear phishing
Phishing scams are one of the most common and successful methods of data theft, which makes sense. They target the single most vulnerable part of the security apparatus: People. And there’s one subset of phishing that is particularly effective.
“Spear phishing” specifically targets individuals by using personal information to convince the victim that the criminals are a familiar entity – an employer, family member, or favorite retailer – to gather private data: bank accounts, credit card information, and Social Security numbers are common requests. Luckily, there are usually a few clues that the communication isn’t legit and knowing how to spot them can protect you from being a victim.
First, businesses will not request your bank account number or Social Security number in an email. If someone on the phone is claiming to be from a collection agency, you can perform a few quick Google searches to verify their identity. Second, a legitimate agency will never ask for payment via cryptocurrency or gift cards. Third, email and letter phishing scams tend to feature glaring spelling and grammar issues.
The other, most obvious way to avoid email phishing scams is to avoid opening unsolicited emails and, on those occasions when you do open them, never clicking links or downloading attachments. If you’re worried about not being able to receive files from customers or coworkers, secure client portals and shared folders are viable options.
(2) Evil Twins
Evil twin attacks are when cybercriminals create a fake wireless access point that impersonates a real Wi-Fi- network, enabling cybercriminals to directly monitor victims’ traffic or redirect victims to websites containing malware. Criminals usually set up shop in high-foot-traffic areas that advertise free Wi-Fi, like airports, coffee shops and shopping malls. Unfortunately, there’s no way to know which “hotel Wi-Fi” is legit.
If you don’t want to self-regulate what you do while connected to public Wi-Fi, one solution is a virtual private network (VPN) service. When you use a VPN, your device’s traffic is encrypted, which – while not impenetrable – places a barrier between your data and would-be cybercriminals.
Stop me if you’ve heard this one:
You’re working late on a project that’s due tomorrow morning, but a Windows notification asking to download and install an operating system update stops you dead in your tracks. Rather than taking a break that could last an hour or more, you click “Remind Me Later” and keep working on that deadline. Six months later, the update is waiting patiently for you to find the time. It’s essential for us to find the time to update our operating systems because such updates often include security patches that can help prevent attacks that compromise our cybersecurity.
Ramsonware holds your computer’s data hostage until you make a payment to the cybercriminals responsible for the attack. Generally, if you don’t make a payment by a specific date, all your data is deleted. But even if you pay the ransom, there’s no guarantee you’ll get your data back – and since most of these scams ask for payment in Bitcoin, it’s not possible to simply reverse the charges.
The May 2017 WannaCry ransomware attack succeeded because people failed to update their Windows operating system. Before installing the update, Windows users were vulnerable to an exploit that didn’t even require they actively download malware to their system – even worse, if one computer on a network became infected, it was likely that WannaCry would spread to others. Here’s the rub: Microsoft issued a fix for supported versions of Windows two months before the attack took place.
(4) Wrapping things up
What else can you do to protect your data?
Aside from installing security software like antivirus and antispyware programs, you probably need to address your password hygiene.The problem with passwords is if they’re easy to remember, they’re usually not very secure. Since every account needs a strong unique password, a password manager can be a relatively easy solution.
Password managers randomly generate and store passwords associated with your accounts, and some will even auto fill website forms with all of your login information. In the event of an account compromise, you just generate a new password. When you use a password manager, you only need to remember the password that logs you into that service.
Criminals have many ways to get their hands on your private information. Let’s stop making their job easier.”
Credit to Ryan Norton, CPA Voice The Ohio Society of Certified Public Accountants - September/October 2018. Ryan is a GruntWorx contributor. This originally appeared on the Boomer Consulting, Inc. blog on June 14, 2018.
Thank you for all of your questions, comments and suggestions for future topics. As always, they are much appreciated. We may be reached in our Dayton office at 937-436-3133 or in our Xenia office at 937-372-3504. Or, visit our website.