Sunday, April 2, 2017

Data Breach Incidents - Week 3


                Looking through the past few years of Verizon’s Data Breach Investigations Reports, it makes me wonder how the same issues keep happening year after year. Yes, hackers and attackers get more sophisticated and creative as technology safeguards advance, but some of the same things keep happening each year. The 2016 report says 40% of the incidents could be prevented with what they consider “quick fixes.” If this is the case, why aren’t these quick fixes being utilized?

                Phishing still seems to be the biggest culprit for data breaches.  As long as phishing has been around, do people still not pay attention when they open emails and attachments? How much effort does it take to look at an email and make sure it’s from someone you would expect an email? If it’s not, check it first. Don’t open any attachments.

                Another one is using default or weak passwords, or doing something that allows someone to steal your password. Everyone knows what the default passwords are. When you first log into a system, change the password. Don’t change it to a weak password. Make sure it is strong and not easily figured out. Then, when you create a strong password, don’t write it down. That’s how they get stolen.

                One more on data breaches…card skimmers. They’ve been around for a bit and most times people pay closer attention when they use a card reader. If you’re in a hurry, still pay attention to your surroundings. Especially for those “quick” stops to fill up a gas tank. There are now tamper-resistant and tamper-evident card readers. Take a closer look and see if there is any evidence to lead you to believe it has been tampered with. Take a look at other gas pumps at the same place. Do they all look the same? Odds are if someone is using a skimmer, they’re not going to put one on every pump. If something looks out of place, don’t use it and alert the person inside behind the register. If in doubt, go inside and pay.

No comments:

Post a Comment