Protect Yourself from Hackers by Following These Vital Steps


On almost a daily basis, headlines around the world are filled with the news that another major corporation has been infiltrated by cyber criminals and they are now dealing with a whole host of associated problems because of the attack.

To find out more about ways in which both companies and individuals can better arm themselves against these predators, I recently spoke with Web Security Expert Alan Wlasuk who is also currently the managing partner of WDDInc., a software development company and its subsidiary 403 Web Security, a secure Web application development company in Indianapolis, Ind.

Touted as developing client server and now Web applications for around 18 years, both companies are heavily focused in on powering high quality, secure Web applications for clients.

“Three ways that e-mail accounts commonly get hacked is by first people making bad choices about their e-mail passwords, selecting easy to figure out passwords. The next is often times people will trust the e-mail environments to a higher degree than they should, which puts them at risk of being penetrated. Third and perhaps what I think is most prominent, is malware. Malware is being distributed across the world. 50 percent of all computers have malware and if it sits on the home computer, what happens is it records a user’s every key stroke and then when they log into any websites it saves every e-mail address they use as well as passwords.”

One point to highlight is that a password management solution can help to raise the bar on security as it enables people to easily manage multiple different passwords for various accounts.

He added, “Part of the bad choices that people make is that they use the same password for every account they have even if it’s a rhythmic, complex password that is then used in 25 places across the Web. If just one of those places gets hacked, it will immediately enable hackers to get into every other site with the user’s information. This offering is really important.”

 Some of the personal and financial issues that stem from when someone is hacked other than feelings of both anger and frustration include, according to this expert,: identity theft, the fact that e-mail accounts often contain information that should not be made public and cyber extortion is extremely popular amongst certain groups, and then if someone’s e-mail address is made public their contacts could then suffer consequences including being overwhelmed with spam.

To avoid being hacked, the casual users should do their best to avoid malware at all costs. Ensure that you have an active anti-virus or malware solution in place, run periodic scans in case you do have malware or viruses, stay password safe by selecting clever passwords and don’t ever use the same one twice, and last but certainly not least tread the Internet with care.

“Avoid sites which seem like they may be risky and for heaven’s sake don’t open up and process e-mail when you don’t recognize the sender of the message. The worst thing you can do is open up an e-mail about a product, click on a link and end up on a website that is full of malware,” Wlasuk concluded.

If you are unfortunately a victim of a hacking, first take a deep breath and then change your passwords as soon as possible for all of your accounts. Figure out what you’ve done wrong and what may have not been so clever on your part, rectify it, and then learn from your extremely annoying mistake.

Edited by Amanda Ciccatelli
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Web Editor

Related Articles

Web3 in 2024 - What's the Story So Far?

By: Contributing Writer    2/26/2024

Is Web3 a thing yet? Click here to learn about the 2024 Web3 story so far.

Read More

Shabodi Accelerates Adoption of Network-Aware Applications with CAMARA API Enterprise Reference Implementation

By: Special Guest    2/16/2024

Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…

Read More

How Much Does Endpoint Protection Cost? Comparing 3 Popular Solutions

By: Contributing Writer    2/2/2024

Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…

Read More

What Is Databricks? Simplifying Your Data Transformation

By: Contributing Writer    2/2/2024

Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …

Read More

What Is Blue/Green deployment?

By: Contributing Writer    1/17/2024

Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…

Read More