You've been hacked! Guarding your personal data
There are many tools available in the market to prevent cyber hacking, and most of them are free.
On a recent visit to my mom’s house, she asked why I spent so much time on my phone. Not talking, which is the only use a phone has to her, but doing seemingly everything else. Online banking, changing my auto insurance coverages, ordering food, checking into my flight, ordering the Lyft to take us to dinner. You wouldn’t think 26 years between mom and son would make that much of a difference, but in the world of technology, it does.
Consider this: Many of us do virtually everything online. We live in an app-driven economy. My 80-year-old mother has a phone that plugs into a wall, an address book with phone numbers, a Yellow Pages (I honestly didn’t even think those still existed), and no ATM card out of fear of having her money stolen. Thinking back, it is pretty much how things were 20 or 30 years ago.
But today, our phones have become permanent appendages. We live in a mobile world where billions of people possess app-driven technology. The app economy deepens customer engagement, improves customer experience, and drives in more and more revenue for a wide variety of goods and services.
However, wherever personal information or business opportunities reside, hackers lurk in the shadows, looking for opportunities to fund their illicit ventures on the dark web. This may go well beyond hackers, who are often perceived as being overseas.
Hacking apps isn’t a random thing; it is pretty common and not overly difficult with the right tools. At the highest level, we can recall a 2017 WikiLeaks document dump about the CIA’s computer hacking tools, which highlighted the agency’s penetration of consumer electronics.
According to Security Intelligence, the majority of compromises took just minutes to complete. There are many tools available in the market to support hacking, and many of these tools are free. Mobile apps are easier to hack than centralized web environments as they are on distributed, fragmented and often unregulated ecosystems.
But there are ways to protect yourself from hackers:
- Keep your apps up to date. It seems pretty simple, and we typically do this on our laptops but often are remiss when it comes to apps. Sometimes there are no reminders; other times, it is frustrating because the interface changes. But the most important thing to remember is that most hacks exploit vulnerabilities that have since been patched.
- Periodically give your app portfolio a once over. Take a look at your privacy under your settings. Delete apps you are no longer using. Make sure that the proper level of privacy is in place on your phone, social media and apps.
- Be cautious of what you install. Whenever you download an app, you are granting certain permissions. Are you taking the time to read the user agreement? Don’t worry, neither am I, nor most people for that matter. But oftentimes you are giving access to certain capabilities. This becomes especially troublesome when there are lax app vetting processes in place.
- Don’t make it easy for thieves. Having a password that is not easy to guess is a start. Facial or thumbprint recognition provides additional security; although, none of the above is perfect. Think about the thief who swipes your purse containing your facial recognition prompted iPhone. Having the ability to use your ID to pull up your picture online, and use your LinkedIn public profile image to unlock the phone, while perhaps a stretch, could be quite problematic.
- Auto-login is great…unless you forget to log out. Using a password manager can minimize this risk, and using different passwords for different accounts lowers your risks even more.
- Watch out for public WiFi, where your usage could potentially be monitored by specialized software. Stick to VPN tools that route traffic through encrypted channels.
- Be careful what you post on social media. Consider that nearly two-thirds of Facebook accounts have limited or no privacy settings, which becomes a treasure trove for hackers. Some users will show their actual name, date of birth, city of birth and current residence. There really isn’t much more needed to create an alter ego to hack your accounts and set up fake profiles.
- Give some thought to investing in smartwatches that can keep track of your phone, and if they lose contact, can provide you with notification if your phone is more than 100 yards away, a possible indication of theft. Even in the absence of a smartwatch, several steps can be taken, such as enabling the “find my phone” functionality or programming your phone to automatically erase after a certain number of login attempts.
The bottom line is that we are all vulnerable unless we decide to forgo all technology. But we have to balance safety and security with convenience and practicality. Perhaps you have tried to give up social media for a New Year’s resolution or your smartphone for Lent. It’s tough. Really tough. We have become a truly mobile society where virtual connections with everything from family and friends to banks and consumer products.
We can’t live in fear of hackers, but a better understanding of how to prevent them from attacking us will go a long way toward providing some peace of mind.
Chris Tidball (chris.tidball@exlservice.com) is vice president – sales and claims transformation strategy at EXL.
Related: