3 ways to protect yourself from hackers
Many police agencies, private businesses, and even our own Federal Government have experienced some kind of hacker intrusion in the past few years
Thanks to Hollywood, there’s widespread misunderstanding of what a computer hacker really is. In essence, hackers write lines of computer code (typically referred to as a virus) as a means of gaining illicit entry to a computer system.
Certain hackers are a real and serious threat. Yes, some are just kids living in their mother’s darkened basements, eating Twinkies and drinking Mountain Dew, but others are nefarious actors we’d be mistaken to underestimate.
Some are contracted by unfriendly governments and/or terrorists to work 24/7 to attempt illicit entry into a protected computer system and try to cause some kind of chaotic event. In the last several years, we’ve seen several reported illicit computer network intrusions (either attempted or successful) that resulted in some type of inconvenience for users.
Most computer networks have some kind of virus protection (which you should frequently update) installed in them but new viruses are written every day and others may lay dormant until a certain function is executed, unleashing the virus and completing the task it was written for.
Many times the virus was written to gather simple information but other viruses are written to gather financial information or other vital information that could possibly have damaging results in the wrong hands.
1.) Be Careful Which Emails You Open
If I see any suspicious email, I don’t open it and immediately delete it. It doesn’t matter where or who it came from.
For example, you might see an email that has what is possibly a normal address but if you look at the complete address you would probably see an odd domain name, for example email@example.com.
Fortunately, most email servers now automatically move suspicious email into a “Junk” file. While in the “Junk” file, the email lays there until you completely delete it. But be careful what “Junk” files you delete; some legitimate emails sometimes make their way into the junk file. I personally look at my “Junk” file daily to ensure I can safely delete the mail without losing any vital email.
2.) Change Your Passwords
Many businesses, municipal governments, school and other professional industries already have many security features in place that require you to change your password at a certain time. Those same institutions also have character requirements for users.
3.) Secure Your Network
Finding an unsecured computer network can be done with an Internet-enabled smartphone. For example, I have been dispatched to calls of suspicious vehicles in a neighborhood and discovered the person in the car was just “browsing” the internet by using an unsecured home computer network from the street. This is becoming more frequent in our ever evolving technological environment.
Some hackers even conduct drive-by hacking. These hackers drive into neighborhoods with a computer and look for unsecured wireless computer networks. Once they discover one, they are able to administer an illicit activity or even gather pertinent information that may divulge sensitive personal or work information.
To help insure security from hackers on your personal and possible work networks accessed from home, be sure to secure your home computer network. This is a simple task that can be done by following the instructions that are included in the network router manual.
|Back to previous page|