Key Ways Hackers Prey on Targets


Hackers are having a heyday. In the past three years, ransom payouts have increased 250%, from $1 billion in 2017 to $3.5 billion today. And with more than 75% of North American companies planning to shift to remote work permanently post-COVID-19, security breaches will likely increase exponentially through 2020 and beyond. Understanding hackers' access points to your data is the first step in prevention, explained CEO Michael Contento, in his recent webinar on this very topic. Below is a snapshot of three key ways you may be putting your information at risk. For more in-depth explanation of each of these points, as well as how MBU’s seven-step data security program can help you and your company, watch the video above.

Smart home technology
Phones, lightbulbs, doorbells, thermometers--everything that’s connected to your home wifi is a digital footprint that can be understood by hackers. Most people never change the default passwords on their smart home technology--which allows hackers through the front door to your data, using a smart home device to access your computer, passwords, personal and financial information.

Social engineering
Hackers fool users into revealing passwords or information through phishing, spear phishing or vishing--methods that see the user clicking a link or image, and entering information the hacker can use to gain access to the user’s data.

Open Wi-Fi
Encrypted connections protect your data, but open Wi-Fi networks are unencrypted, making them risky. Anyone can create a fake hotspot and trick your device into joining it--then accessing your personal information, financial and personal data. A typical hacker hack is to name their hotspot after popular open wi-fi spots, like “Starbucks”.


Leave a comment!

All fields marked with an asterisk* are required.