Cyber criminals are not picky – when it comes to hacking computers, they will have a go at anything they come across. Yes, hacking a large organisation could potentially yield a higher return, but it is also harder to infiltrate. When it comes to computer hacking, every computer is at risk.
These are the 5 most common ways hackers get into your systems.
5 ways hackers gain access to YOUR computer.
Viruses: The computer virus is alive and kicking and still doing what it has always done – attacking people’s computers and causing havoc. Coming under this heading are programs such as malware, malicious software that is designed to steal your personal data, ransomware, designed to ‘blackmail’ you into payment of some form, and spyware that does what it says – watches what you are doing on your computer to a greater or lesser extent.
Dictionary Attack: Knowing that the majority of people still use simple passwords, this is an example of a brute force attack. Employing an automated process, the dictionary attack feeds lists of commonly used passwords and phrases into a computer system until something fits. If you still use a password like the ‘most popular ones’, 12345, QWERTY, or have left it as Admin, it doesn’t take a lot to bypass.
Fake WiFi: Logging into ‘free’ WiFi in a public space can be a risky business, with unsecured networks and hackers lurking, ready to pounce on your connection and view every single thing you do on your computer.
Telephones: In addition to the fake telephone calls telling you that you need to log on to your computer as there is an issue, the hackers have also embraced text messaging (SMShing) and WhatsApp to try and scam unsuspecting folk.
Phishing: Phishing remains a popular, and sadly successful, way of duping us into clicking things we shouldn’t. It occurs when an attacker masquerades as a someone you know and trust, then dupes you into opening an email, instant message, or text message.
There are always measures that you can put in place to keep yourself and your computers and phones as secure as possible, and we have solutions for single, home use laptops through to multi-site businesses.
These are the five most common methods of hackers accessing your computers – and they all take less than five seconds to infiltrate and cause you distress.
Remember, it is not a case of ‘if’ you get targeted, but of ‘when’, so do get in touch if you need any help protecting your equipment and your data.