Cybersecurity – Not Just For the Cool Kids

Hacker in a blue hoody standing in front of a code background with binary streams and information security terms cybersecurity concept

By Clint J. Hall

It wasn’t too long ago when ‘Cybersecurity’ was relegated to those nerdy kids coding computer games in basements or, at best, the product of a sci-fi film about corporate espionage and hacked Swiss bank accounts. Very few people today would consider this to be of importance in their daily lives; however, nothing could be further from the truth. Even if you do not own a computer, insist only on sending letters in the mail to communicate with friends and family and stuff all of your life savings in your mattress instead of a bank, you are still susceptible to identity theft in the digital age.

Simply being born and alive will have your birth certificate digitally recorded in county and state databases. Having any utilities will have your identity and address on a utility company’s files, not to mention any third-party company they may do business with.

Cybersecurity is a responsibility shared by everyone in the modern age and should be treated with awareness that is appropriate to its potential impact on our daily lives. In all actuality, you don’t have to even be alive for your identity to have value on the black market. Identities of the deceased are routinely used for illegal gains.

Nothing new under the sun . . .
It doesn’t matter if its 2021 or 1821, the same cons are being played now as they were then. The only difference is the medium in which they play out. It’s important to keep aware of how the “old wolf” has re-dressed itself in modern clothing.

Of all the security breaches, Social Engineering is the most prevalent and the easiest to perform. No amount of security on your computer will prevent someone from accessing it if you willingly give them the keys.
Social Engineering is the idea of using the human condition against itself by taking advantage of socially accepted norms. Beware of getting a call from someone important, telling you in an urgent voice to let them do something you normally wouldn’t allow.
Being on a website and seeing a popup saying your computer is infected and you need to call this number to have them fix it is an example of a well-used social engineering tactic.
By using the fear of losing your personal data and the guise of a trusted entity, you feel pressured into making the call and allowing someone access to your computer.
Classically, this is no different than a snake oil salesman parading into town promising a cure for some illness you didn’t even know you had. Have you ever received a letter from a foreign prince desperately needing your help to secure funds locked away? All they need is a little money from you and in return they will gladly share a portion of the wealth.

Nothing is free . . .
I often hear people comment that a hacker wouldn’t want their personal information and they don’t have any money anyway so why would they be a target? First, any money is better than no money and a crook doesn’t care that much if it’s your last penny or not, as long as they can get their hands on it. We are all pretty well condition to be wary of anyone attempting to garner their hands on our well-earned cash. With that in mind, it is far easier for crooks to go for the less obvious valuables. Identity theft is one of the most common methods for quick cash.

Quite often, a person’s identifiable information is not stolen but freely given away.

How many free online offers have you seen where all you need to do is fill in some personal information?
Have you taken any free Facebook surveys asking about your likes and dislikes recently? What about all of those “free” mobile apps and games downloaded by the thousands every day, do you ever wonder why a mobile game needs access to your personal contacts on your phone to install itself?

Identities consisting of a little more than a social security number and address can sell for up to $15 apiece in online black markets. That may seem like small change; however, this is usually just the start of a much larger campaign for funds. Armed with a valid social security number and address you can:

• Apply for credit cards, loans and bank accounts
• Apply for a copy of your birth certificate and assume additional proof of your identity
• Attempt to file for Social Security benefits or tax refunds
• Apply for utilities or services for which you will receive the bill

Simple steps you can take to keep your identity safe

Cybersecurity isn’t a complicated or difficult process. Primarily, as with many things, common sense can go a long way. The most important thing to remember is nothing is free, you are going to pay for it in some fashion or another so be leery and cautious of what you click on and what information you give out.
• Keep your computer up to date. If you are prompted for new updates, install them. If your computer is older than 8 years, it’s probably time to replace it.
• Use a reputable anti-virus. Most modern operating systems will come with at least the bare minimum for antivirus security; however, paid for subscriptions will additionally offer more services.
• Think twice before clicking on any links from emails you receive, even if they come from a friend or family member. Remember chain letters? Passing on emails with malware links embedded because it came with a good joke or a funny cat video has been the bane of many people.
• Don’t use the same password for everything. It only takes one service you’ve signed up for to be compromised and your password is known and sold to the entire underground. While you may attempt to do your best in keeping security at home and top notch, imagine keeping security for an international company with thousands of employees, computers and diverse networks. Companies are hacked daily and not just the small unheard of ones either.
• Keep backups of important data. Ransomware is the number one malware on the internet these days and there are any number of avenues as to how you can get it installed on your computer. The best way to prevent your data from being held hostage is to keep current backups of it. There are many free and paid for services available to fit this bill so there should be no excuse not to be backing up your information.

 

CLINT J. HALL….. BIO

Clint J. Hall has twenty years of experience in the Cybersecurity industry and holds a Master’s degree in Information Technology specializing in Cybersecurity.

“ I’ve spent most of my life attempting to simplify daily navigation in the information age. This is truly an interesting and defining time in our history. With almost limitless access to all of acquired human knowledge, I expect to see some amazing growth as we progress through the 21st century. As an experienced insider in this field, I feel it is my responsibility to ensure that everyone has both the access and knowledge of how to not only benefit but to thrive safely in a digital environment.”  -Clint J. Hall