Here are 7 common mistakes that make it easier to hack your system, network or online account.
- Installing pirated software: Looking for a pirated version of a software could lead you to visit malicious websites containing scripts or malware that might automatically infect your PC once you visit them. Moreover, you might end up downloading a trojan or backdoor along with the pirated software. A trojan or trojan horse is malware that may pose as legitimate software or link, usually to lure the user into downloading, clicking or opening the file/link. The installed malware might steal sensitive information, delete your important files, open a reverse shell for the attacker to take over your computer etc. There could also be legal implications for using a pirated copy of certain software.
- Weak Passwords or Using the same passwords across multiple sites: A weak or easy to guess password makes it easier and quicker for hackers to gain access to your computer, network device, email or social media account. An equally dangerous risk is using the same password across all your devices or online presence. The implication of using the same password across multiple sites is that hacking into one of your devices or accounts automatically means they can access your other devices and accounts without extra work, effort or time. Avoid using the same password across multiple sites and endeavour to make your passwords a minimum of 8 characters wherever possible, a combination of lower- and upper-case letters, one or two special characters (e.g., #, -!) wherever possible as well.
- Poor online practices: this includes visiting potentially malicious websites (e.g., movie streaming websites that usually involve several clicks), or opening every email attachment that looks interesting, or opening every picture or ad that looks enticing. All these mentioned are examples of simple user actions that could trigger or allow malware in; causing great damage. Another poor online practice is divulging too much information about ourselves on social media. This would only make the job easier for attackers (online and physical attackers). Read more here.
- No antivirus: A very reliable antivirus could help stop many attacks or alert you of suspected viruses on your computer. A suggestion would be to avoid the free or pirated antiviruses but invest in a good and reliable antivirus. However, you need to make sure your antiviruses are up-to-date because most antiviruses are able to detect malware based on the malware’s signature (i.e., pattern or mode of operation). Your antivirus would usually contain a signature database which needs to be updated as often as possible to enable your antivirus software reliably detect the presence of malware. Just in case you are unsure what antivirus to go for and would like a suggestion from us; you could try the VIPRE antivirus.
- Firewall is off or misconfigured: Firewalls use a predefined set of rules to decide who/what comes in and goes out of your computer or network. Firewalls are able to filter wanted and unwanted traffic in both directions. Having your firewall turned off or having no firewall is synonymous to leaving the gate of a palace open without soldiers to check who/what is coming in or leaving. Anyone could come in, steal the staff of royalty, and catwalk right out in style through the open gate. You don’t want your precious palace invaded by creeps or criminals, neither do you want unwanted people coming into your palace without inspection so ensure your you have an active and properly configured firewall. See a simple way to check your Windows firewall here.
- Not installing important updates: In the business world, not all updates might be installed because there is a need to do a risk assessment and check for compatibility with other systems and solutions needed to keep the business afloat. However, most updates are recommended as they usually fix discovered vulnerabilities or security issues. Failure to install system updates could leave you open to attacks that may take advantage of those vulnerabilities you have not patched.
- Not using a VPN (Virtual Private Network): This serves as a secure tunnel for your traffic to travel thereby protecting your sensitive information from perpetrators. We all perform online transactions these days with our credit cards or other forms of online payment with our details entered. Using a good and reliable VPN significantly reduces the chances of your sensitive information being stolen or used without your permission.
I think we have all installed cracked software at some point . You won’t catch me doing that now though. Too risky.
honestly; especially we gamers. I wonder how many times we’ve downloaded viruses along with the game smh.
Good you have stopped Queen. With easy-to-use tools like veil, an undetectable backdoor can be attached to almost any file. Once you run that file (e.g., mp3, mp4, putty etc.), the backdoor is also executed in the background.
This is very enlightening
This is very educational, we take so many things for granted in our search for IT solution. Thanks for this write-up, it’s very enlightening.
Yes Samuel, you are right.
We are also glad you found this useful. Hope you spread the word.
This is very interesting and educating to read. Concepts that would have been considered complicated explained so intelligibly and practically. Thank you!
Thank you David. Hope you share with friends, families and colleagues.
LOL I like the palace analogy used for the firewall being off. I definitely don’t want anyone to invade all my files on my computer. I’m so guilty of using the same passwords across different platforms.
I used to download all my music from LimeWire back in the day and I remember how so many PCs were destroyed because of the pirated software!
Hi Mory! You are definitely not alone when it comes to using the same password almost everywhere. Many people do so for ease. However, we hope you change your passwords, and abstain from using the same password henceforth especially after reading this.
We also hope you share with friends, family, & colleagues.
Thank you for this. I certainly learnt a lot.
I think this speaks to me , always looking for cracked softwares for my team. Funny enough I have disabled firewall on several occasions just to install a software.
Just thinking out loud, some of these softwares are expensive, so admin can you advise on how to balance not been hacked and reducing expense as much as possible. I am aware for instance that they are educational softwares also available just for educational purpose and not business, saying this because I don’t know how many people can afford some big industry softwares we use
However I would take all learnt into practice and be careful.
This is really an eye opener.
Thanks admin
oh, interesting question Dolapo!
Yes, you are right. Sometimes, the cost of the software could be on the high side. However, from a security perspective, the first step would be to do a risk assessment (RA). The RA should include a Cost-Benefit Analysis (CBA). A CBA can help estimate the following:
1- What are the chances (likelihood) of being hacked or downloading malware along with the cracked software? Is it low or high?
2- If the likelihood is high, what is the potential impact (cost of being hacked), and what is the cost of just investing in the original software or adequate security?
3- Which would cost more? (especially after taking into account things like reputation, financial loss, potential data loss/leakage, potential lawsuit, etc.)
4- Remember, ‘Expensive’ does not always mean ‘The best’. A RA might also help determine the best solution or software to achieve your business goals. Businesses and Companies are different. Your business might not need any of the expensive software or solutions in the market after all.
This is informative. Thank you
Thank you Tibzy. We are glad you found it informative.
It was great seeing how much work you put into it. The picture is nice, and your writing style is stylish, but you seem to be worrying that you should be presenting the next article. I’ll almost certainly be back to read more of your work if you take care of this hike.
Its like you read my mind You appear to know so much about this like you wrote the book in it or something I think that you can do with a few pics to drive the message home a little bit but other than that this is fantastic blog A great read Ill certainly be back
Hello, Neat post. There’s an issue together with your site in internet explorer, would check this텶E still is the marketplace chief and a large element of other folks will leave out your magnificent writing due to this problem.
I just could not leave your web site before suggesting that I really enjoyed the standard information a person supply to your visitors? Is gonna be again steadily in order to check up on new posts.
Your article helped me a lot, is there any more related content? Thanks!
Hi Neat post Theres an issue together with your web site in internet explorer may test this IE still is the marketplace chief and a good component of people will pass over your fantastic writing due to this problem
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.