Modern technology has made our lives highly efficient, through credit card transactions, internet accessibility, and so on. Although this phenomenon maximizes convenience, it also gives hackers more opportunities to steal private information.
By Jessica Woo
Hackers can target public Wi-Fi networks. Some create profiles that run under a name similar to that of a legitimate provider and automatically log devices onto their Wi-Fi to view user activity. They do this by tricking phones and tablets into thinking that the network has been accessed before.
Of course, information can be stolen in ways other than through Wi-Fi. Credit card skimming has become a popular hacking scheme. It’s the practice of stealing a credit card’s magnetic information by swiping it against a skimming device. Gas stations, ATM’s, and even fast food restaurants have been reported being victims to such practices. Handing information over to legitimate companies puts us at risk as well. Target comes to mind with customers’ credit card information being stolen, along with DSW Shoes and Ralph Lauren customers’ private information getting compromised.
Point is, data theft can occur anywhere. You’re probably getting hacked right now and you don’t know it! What to do ? Don’t panic. These risks do not mean that we should avoid modern technology altogether.
What to do?
Carey Nachenberg, a top researcher and a UCLA professor, says:
Cyber-Security systems have inherent security vulnerabilities that arise from both human and technological factors.
Basically, there’s no such thing as 100% safe in the cyber world. We can only take precautions.
The important thing is to understand the ways in which our private information can be stolen. Then, take precautions against it.
Data theft
According to InfoSec, you can prevent Date Theft by identifying what’s at risk and how to prevent it.
– At risk:
- USB thumb drive
- 3G mobile phone network
- Wireless LAN
- Removable hard disk
- Notebook computer
- Portable personal digital device like MP3, PDA, Phones
- Printer output etc.
- Personal information such as bank account or details
- Customer database
- Confidential/sensitive business information e.g. tender information and quoted prices.
– How to prevent it:
- Protect your mobile devices
- Data theft sometimes happens when you outsource your IT services. Learn how to prevent data loss from IT outsourcing.
- Review the access control policy
- Encrypt your data.
- Protect your wireless network.
- Secure your company network.
- Conduct security risk assessments and regular security audits.
Identity Theft
How to protect yourself from the horrendous crime of Identity Theft:
- Use strong passwords: That’s a no-brainer that many do not take seriously.
If your identity has been stolen, follow these instructions: (Click here).
Want to learn more?
Watch this informative video by Carey Nachenberg talking about Cyber Security while outlining computer and internet threats.
Taken at the Cyber Boot Camp. Sponsored by Stanford’s CISAC and the Hoover institution (Video – jhubb01, Vimeo).
We hope you appreciated this article. Before you move on, please consider supporting the Colorado Boulevard’s journalism.
Billionaires, hedge fund owners and local imposters have a powerful hold on the information that reaches the public. Colorado Boulevard stands to serve the public interest – not profit motives.
While fairness guides everything we do, we know there is a right and a wrong position in the fight against racism and climate crisis while supporting reproductive rights and social justice. We provide a fresh perspective on local politics – one so often missing from so-called ‘local’ journalism.
You can access Colorado Boulevard’s paywall-free journalism because of our unique reader-supported model. People like you, informed readers, keep us independent, beholden to no outside influence, and accessible to everyone.
Please consider supporting Colorado Boulevard today. Thank you. (Click to Support)
Leave a Reply