In light of the recent hack into T-Mobile’s network I must stress to my audience the importance of securing your data.
If you are talking on any phone about something “secret” know that it is NOT a secure phone call but anyone with the right capabilities (even someone like me who is NOT a hacker) can listen on cell or wireless phone calls.
For your DATA, the safest way to ensure it is safe is to use email that encrypts the message before it leaves your computer – the recipient then decrypts the message on their end.
Every communication you make is not a “secret” but those that are of the utmost importance must be secured before it leaves your computer and goes on the VERY public telecommunications network.
USA Today writes Hackers may con their way into a phone network by posing as phone company tech employees to get passwords into the network. Then they could essentially tap phones or search for personal data like text files or even camera phone photos.
“(Hackers) will sit there and listen in, waiting to get valuable information,” Echemendia said. “Once they have a foothold on one system they go through the same process to find other hosts.”
Security experts at Intrusic captured 4,466 passwords and 103 master passwords allowing global access to corporate databases while monitoring one Internet service provider for a 24-hour period, Intrusic President Jonathan Bingham said.
“It’s like stealing candy from a baby,” Bingham said. “The malicious attacker will assume the identity of a person whose password they have stolen through this passive sniffing and they end up entering this organization as a legitimate user.”
Once inside, it takes the hacker seconds to set up back doors that allow access to the database at any time to do more spying, data theft or worse.
My suggestions: Hire a SECURITY EXPERT to advise you of a few security options and then have a security consultant implement all or some of them.
You should also remember that a good hacker is SKILLED at speaking and talking. Much of their work might not even take place at the computer. It could be as simple as posing as a desperate employee who needs to borrow your password to logon to their computer to get an important email from the boss.
Read “The Art of Deception: Controlling the Human Element of Security” by Kevin Mitnick. Most of his tactics were not technical, but were all “human” related. You might spend thousands on a fancy security system, only to have your secretary give out your password to the “friendly” hacker.
Latest posts by Ramon Ray (see all)
- Advice from the 2017 SXSW Dell Experience: How to Pitch a Complex Business - March 30, 2017
- The Experience: Dell Showcases the Power of Technology at SXSW 2017 - March 28, 2017
- Accounting Gets Artificial Intelligence: Xero’s New Service - March 16, 2017