How do you protect your Internet security in this age where technology is progressive and devices being produced have Internet capability? We can’t stress enough how important data security is when the Internet is never always secure.
What are hackers after for anyway? In 2011 to 2014, their primary target was cardholder’s information.
- 96% of stolen data were of payment cards and are used for fraud
- 2% of stolen data were of intellectual property and classified information
- 1% of stolen data was of the ePHI (Electronic Protected Health Information) that can include your Social Security numbers and payment information
- 1% was of financial numbers in business which includes operating cash flow, bank accounts, your net income, and total inventory
Why would these hackers want to get your personal information and sometimes even the minute details of your life story such as your pet’s name? Two words – Identity Theft.
Just last year, the number of identity theft victims was at 12.6 million. That means for every three seconds, there was one person victimized. In 2012, hackers managed to get a total of $24.7 billion and 15.4 billion in 2014 for their supposed craft.
Below are what hackers set out to get from us on a daily basis:
- Account log-ins (usernames, passwords, and PIN numbers)
- Bank and credit card account numbers
- College or university financial aid information
- Contact details
- Driver’s license and passport numbers
- Employment and student ID numbers
- Insurance ID numbers
- Professional license numbers
- Social Security numbers
- Utility account numbers
3.Methods of Entry
Now how do these hackers find you? Hackers are ingenious and masters of stealth. They employ several ways to get into what you thought was a fairly secure network. Here are some handy technical terms both hackers and security system personnel use:
- 47% Remote Access
Hackers are able to access data remotely, no matter the distance.
- 25% SQL Injection
SQL injection is a web attack mechanism designed to steal data by improper coding
- 17% Unknown
Unknown methods of entry either have weak credentials or a default, or both.
- 3% Remote Code Execution
Hackers can manipulate your server and execute commands remotely.
- 2% Client-Side Attack
Client-side attacks usually take the form of browses plug-ins and any other base
software-related products we sometimes carelessly install.
- 2% Remote File Inclusion
Web servers are compromised when a remote file is included through a script by hackers.
- 2% User Interaction
Data is accessed when a user interacts with a specific element that hackers supplied.
- 1% Authorization Flaw
A flawed access control welcomes hackers to trigger attacks and steal data.
- 1% Physical Theft
A bolder move, this is when people take your personal items such as your laptop to get your lucrative data.
Where else can you find people prone to user interaction hacking than in social media sites? Social media is every hacker’s fishing pond.
- 16% of students were controlled phishing scam victims
- 72% of victims believed in a fraudulent link their “friend” sent
- 68% of social media users publicly display their birth dates
- 63% show where they attend high school
- 18% have their phone number listed on their social media profiles
- 12% mention their pet’s name
Do you still think these personal information aren’t enough to fuel hackers’ desires?
Hackers can easily access your home network remotely (within range) to steal data. Unfortunately, 19% of Internet users still continue to use WEP encryption. WPA-2 encryption is your best bet in securing your home’s Wi-Fi connection.
Click next button below and you get more Information On How To Secure Your Online Activities…
- 1 2