5 Secrets Hackers Don’t Want You to Know

1. They like lazy people

The precautions you take should correspond with the importance of the information you’re protecting. Don’t be the person who tries to remember a random 12 character password, then goes on to use that same password on multiple platforms and logins. Use a secure password manager software to help generate and manage complex passwords. For business this can be something as simple and integrated as RoboForm; Stop relying on your memorized passwords to keep your networks and data safe.
If you’re curious about the safety and security of your current set up, think about using our services to receive a cyber security assessment

Click here to learn more about a Cyber Security Assessment
Learn more about RoboForm password manager: http://zurl.co/gMv6

2. No one is infallible

Even if you haven’t done anything wrong, don’t think you won’t fall victim to hackers. Smart scammers will often focus on long term exposures instead of instant financial gains/ exposure. Hackers tend to squeeze out as much information as possible, no matter how long it may take. They use reverse engineering tactics to collect information about you and your business to design an attack campaign. This is why they are so convincing with their approach.

3. They’ve got all the time in the world

A smart hacker will be nowhere near pressed for time. They will slowly scalp away at your data from the second they can find an in. They go to sleep, wake up in the morning, and their program is still going. It’s important to be consistent with your security so you can determine any unwanted point of access.

4. They prey on uninformed employees

*Studies show that many data breaches are due to employee negligence and, due to the increase of remote work due to COVID-19, the risk has grown. Anyone in your company that uses the company’s IT network must undergo proper training. An untrained employee is a risk to security, all it takes is one mistake for someone to get in and start scalping your data/ accessing your network.

5. They HATE 2 Factor Authentication

To put it in short terms, 2 Factor Authentication (2FA) is a life saver. Whether you use a service like Google Authenticator, a companies 2FA for their service, a hardware key, or a text verification: 2FA is an extremely important step to securing your accounts and ensuring that only the people that should have access are the one’s with it.

More Resources
Click here to earn about the 7 Best Practice Tips to Improve Your Cyber Security Hygiene

Click here your checklist How To Stay Safe From Cybercrime

* Study reference: https://www.cnbc.com/2018/06/21/the-biggest-cybersecurity-risk-to-us-businesses-is-employee-negligence-study-says.html

Author:
Miguel Ribeiro – Cyber Security & Business Continuity Expert

Miguel Ribeiro founded VBS IT Services in 2007 and has been leading a “can do attitude” of remote employees since. When Miguel started in IT in 1998, he learned a tough lesson when a month’s data was lost after experiencing data corruption due to a virus that took 3 months to recover from.

The experience left painful scars of a slow and challenging recovery, with lost revenue. Miguel made it a personal mission to learn how to protect his business and his clients’ with the best business continuity strategies and solutions. His mission has evolved over the years to include cyber security protection and employee training awareness programs to create the Human Firewall.

Share this:

Leave a Reply