Share on Social Media:

AVOID GETTING HACKED

Was it the Russians?

We learned last week that someone hacked Democratic National Committee servers, then leaked embarrassing e-mail to WikiLeaks. The ensuing media firestorm had DNC officials on the defensive, and intensified friction between the Sanders and Clinton camps. The DNC blamed the Russians for the breach, though evidence of their involvement is meager and circumstantial.

You might believe this has nothing to do with you. Since you don’t have to worry about international spy rings, you don’t need to concern yourself with cybersecurity. Right?

It would be dangerous to assume that you’re safe. Governments, including our own, could turn their attention to you if they think you have information they need. Corporate interests, criminal gangs, and individuals might spy on you for the same reason. If you work for a company with valuable intellectual property, you face a higher likelihood of becoming a target. How, then, can you avoid being victimized by hackers?

Protecting your computer files begins with educating yourself. According to CrowdStrike, a cybersecurity firm, the DNC breach was a case of ‘spear-phishing’. Spear-phishers exploit familiarity with their victims. These hackers know at least a little about their intended victims. It may be their names, e-mail addresses, or references to social events, friends, or family members. The spear-phisher pretends to be someone his intended victim knows.

Spear-phishing e-mail comes from forged (‘spoofed’) addresses, and appears to be from someone the intended victim knows. For example, it may seem to be from a colleague or a supervisor.

Spear-phishing attacks can be difficult to avoid because they appear to come from trusted sources. Successful spear-phishers usually begin with ‘social  engineering’. This is research of the victim’s social media profiles and online activity. The ‘social engineer’ attempts to learn as much as possible about the victim, his friends, and his employer.

How, then, can you avoid falling prey to such attacks? First, monitor your online activity. Take an especially close look at your presence on social media. Are you giving too much information away? Does the world at large need to know your cat’s name, where your mother lives, or all the awards you won in elementary school? Visit TakeThisLollipop.com to track how much you’re sharing. It may make your hair stand on end.

Second, think before responding to e-mail. If someone you know sends a message that’s out of character, be suspicious. Be especially careful with requests for urgent response or wire transfers of money.  If you’re unsure, call or text the apparent source for confirmation. Avoid downloading attachments to messages you weren’t expecting.

Finally, ask your employer to do more. Businesses can block e-mail from unfamiliar sources with authentication software. ValiMail is one e-mail security firm that enables organizations to control who sends e-mail under their names.

With a few simple precautions, you can avoid hacking of your e-mail. Stay alert, and your files should be secure.

And avoid getting close to Vladimir Putin. He’s a rascal.