Who uses the dark web? Cyber criminals mostly. People selling illegal drugs, stolen information or other explicit content to people who will use this information for their profit or use. This is not to say it is all bad. There are people who use this to share information while staying anonymous such as journalists, whistleblowers or other people who need privacy.
Just knowing this is out there, is not enough to keep your information safe. You need to know some of the methods they might use to target you. So how can your information get onto the dark web?
- Phishing emails – these are sent to large numbers of people in the hopes of getting some sensitive information
- Spear Phishing emails – these are like the regular emails only they are more focused and require more knowledge of who they are targeting
- Executive Whaling – This type focuses on the top executive in a company to try and steal money or other data
- Social Engineering – with these they look over your websites and other online presence and specifically target you based on this information
Once they have you, they will try and steal your data, add it to the large amounts they already and sell it off to the highest bidder. What are the types of information you should be focused on keeping safe?
- Password
- Medical records
- Bank records
- Private emails
- School records
Now that you know what information will be most sought after and who will be trying to steal it, what can do to help protect your information?
- Enforce strong password that have at least 8 characters, upper case, lower case with symbols. It is also a good idea to not base it on any personal information.
- Cyber Security Training – Learn what to look for and avoid when they reach out to you. Knowing this and how to react will go a long way to keeping you safe.
- Enable Multi-Factor Authentication – This adds an extra layer of protection that most hackers will not be able to get around.
- Vulnerability Scan and penetration testing – As a business in today’s world, you can hire an ethical hacker to test your system and make suggestions on how to remove any vulnerabilities.
For more information on how to protect your companies environment, please contact schick@attechnology.com
Recent Comments