We love our mobile phones and modern technology. So do hackers looking to initiate cyber attacks. Learn what to watch for and how to better protect yourself.
It is hard to think of a more exciting time in technology. We are beginning to see the promise of AI come to fruition in everything from revolutionizing business processes to helping us order food online. Mobile phones, video, and social media allow people to make connections that would have been difficult even ten years ago. It seems that there is practically nowhere around the globe where we cannot reach out to someone.
And that is part of the problem. Bad actors look to exploit the same devices and software that we rely on in our daily lives. They are looking for every advantage they can find to launch a cyber attack. Hackers are using lax security protocols and mental lapses when it comes to protecting sensitive information.
That is a question with a lot of different answers. Let’s start with how we manage our passwords. A study of user password habits conducted by Virginia Tech computer science researchers showed that 38 percent of people use the same password across multiple sites. Facebook was recently in the news for mistakenly stored use passwords in text files that were viewable by their employees.
The company made reassurances that their employees did not take advantage of any of their users and improperly use any passwords. But imagine if they had? If you use the same password for both your Facebook and bank account login, that would have made it much simpler to hack that bank account and access your funds.
Twenty-one percent of online users only made slight modifications to existing passwords when signing up for new services. Here are some other common mistakes made when it comes to handling passwords.
Incredibly, quite a few people STILL keep the same password after being warned that hackers might have stolen it. Did you bother to change your Facebook password after reading the recent news?
Yes, yes, and yes. Just ask Amazon CEO Jeff Bezos. Our phones provide attackers with the ability to find out everything about us. They can track our movements, find out what we like to eat, and how we spend our spare time. That is because most mobile users leave their phones connected to the internet 24/7. Many smartphones come with pre-installed applications with tracking capabilities of which we may not be aware.
Most of us do not have the visibility of a Jeff Bezos, but that does not mean that hackers would not see us as valuable targets. Some ways we could do a better job preventing this from happening include:
IoT devices can be just as vulnerable as cell phones and computers to a cyber attack. The networks they use may not be secure or, again, protected with poorly constructed passwords. Here are a few other things that make IoT devices vulnerable.
There is a lot to be said for the advancements of modern technology. 5G and 6G wireless have the potential to provide high-speed internet access to rural areas in the U.S. and around the world. But providers must still overcome some genuine security issues or risk introducing a new set of problems to overcome.
Security around AI should be the next big area of concern. Most data scientists have not concerned themselves with potential cyber attacks as they expand the capabilities of machine learning to build more advanced AI technology. There should be more effort made to protect the data and AI models used for creating new infrastructure.
Spade Technology makes security a top priority in the services provided to our clients. We understand that even smaller businesses can become targets for a cyber attack. Our team works hard to always use best practices when it comes to protecting information managed by our clients.
Call Spade Technology at (503) 339-5163 to learn more. You can also schedule a complimentary consultation using our online form.