Tuesday, July 31, 2018

Computer Hacks and How To Deal With Them

A hack occurs when someone changes computer hardware or software to make it perform in a way not intended by the maker. Usually that’s done by installing malicious code—malware—on the user’s device. There are many ways to do that from fake public access hot spots to phishing to malware downloaded when emails or documents are opened.

 

How Many Sites Are Hacked?


That doesn’t seem to be a question that can be answered with any precision. Reason? There are just too many, as in this graphic from a site that does track hacks. The answer it gives is “thousands each day.”


In 2014 a CNN headline read “Half of American adults hacked this year.” That could mean anything from a person’s account being included in a large data breach to an individual computer being infected with malware. So the statistics are not reliable, but the implication is clear. Many users are being hacked, and all indications are that it’s getting worse, not better.

While protecting yourself against hacks should be the name of the game, it’s important to know when you have been hacked.

 

How Do You Know You’ve Been Hacked?


The easiest way, of course, is if a site sends an alert that an account has been hacked. Financial services sites keep a careful eye on the accounts of customers and are often quick to notify them or potential problems. I’ll write an entire post on keeping those accounts safe at a later date because it’s so important. As suggested in the post on breaches, companies should notify users that accounts might have been breached. That’s a strong signal to watch out for an actual hack. But that’s exactly the point. Individuals need to watch their accounts for sign of a hack and take remedial action.

Signs your computer may have been hacked include:
•    Device running noticeably slower
•    Network activity noticeably higher
     This can be a rather complex issue. The simple answer is if a device bill has gone up without          explanation.  Some devices or the bills for them show data consumption and that’s one way. See whether your wifi router has protection and reporting options built in. Ask your service provider if you need to understand something going on with the account consumption figures or billing.
•    Pop-up ads with malicious content
•    Security software uninstalled
•    Sending spam email
•    Unable to sign into accounts.

A blog called Livewire puts it in a colorful way:

You opened an e-mail attachment that you probably shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Your bank called you saying there has been some strange activity on your account and your ISP has just "null routed" all traffic from your computer because they claim it is now part of a zombie botnet. All this and it's only Monday.

There are many more specifics, but a user should be on the alert any time strange and inexplicable things start happening on any connected device  First, a short set of recommendations on prevention. Virtually everything I write in this blog will have some relation to preventing hacking. Then, a set of recommendations on what to do if you have been hacked.

 

How Do You Prevent Hacking?


The first and foremost way is to keep your computer and home network security up to date. Be sure you have an operational security system and that it’s updated as needed. Individuals often get security software for free when they buy a new device. They may also be able to get free security software from their ISP. Free is good and in my experience the software offered is one of the leading brands. When for some reason you must purchase a security system, search for the brand and read what it says and what is said about it. At a minimum the software must have a firewall that protects against malicious activities and strong protection against viruses. If parental control is important, look for that. Some also have backup and computer optimization tools.

Be sure that, at a minimum, the software includes protection against viruses, malware, dangerous websites, malicious emails and downloads, and hackers. Many products offer additional services that users may or may not need. What most of us do need today is protection on multiple devices.

There are other steps you should take like making sure your passwords are strong and safe. Those will be covered in future post. For now, let’s look at what to do if it seems that a computer has been hacked.

 

What To Do If You Think You’ve Been Hacked


There are millions of articles online about what to do if a computer seems to have been hacked. I encourage you to search and to read some of the top-ranked ones. I’m going to summarize the non-technical steps that can be taken immediately without cost or much effort.

The first thing to do is to manually start a virus scan; don’t wait for it to start automatically. Carefully review the report, but it is important to remove all the infected files.

It is a good idea to do a separate malware scan especially if you are unsure whether the security system software includes that. I’ve been using the free version of Malwarebytes for years. Early on, it would pick up a lot of malicious accounts. Now it usually picks up only a few, suggesting that my security software is more effective than it used to be. Even one malicious item is one too many, though, so run a malware program to be sure.

Then change passwords that might have been caught up in the hack. If the hack is part of a large data breach, that pinpoints the affected account(s). If it’s email, change that password and consider notifying your contact list not to open anything suspicious that comes from you. If it’s not easy to identify the affected accounts, change all the passwords for sensitive accounts like banking and credit cards.

Take these first two/three important steps in this order to rid the computer of the virus which may be stealing passwords.

Examine the account that has been hacked to be sure that data like billing and shipping addresses is correct. If the site has a procedure to follow for hacked accounts, be sure to follow it.

Request a free copy of your credit account and review it for suspicious activity in existing accounts and for accounts that may have been established without your knowledge. This is not the same as the credit score, it’s a detailed account of activity on all credit card and loan accounts. Each person can receive a free credit report each year from each of the three large credit monitoring agencies. It’s usually best to request one at a time with a delay between requests to stretch the time period covered as much as possible.

If problems continue, you may need to take more technical measures. This is a recent blog post that gives a process. If it is daunting, the best solution may be to take the computer to a professional.

 

Better Safe Than Sorry


It’s a huge pain to deal with a hack, so prevention really is the name of the game. I’ll place continuing emphasis on that in future posts.

Until then, stay safe!

Data Breaches and What To Do About Them

News about data breaches is frequent and often seems frightening. Let me try to demystify the subject and, more important, suggest first steps to deal with the possible consequences.

The Size and Scope of Data Breaches


First, data breaches happen to organizations ranging from mega-corporations to your local health care provider. They are the work of malicious actors, not the fault of individual internet users. (Individual users can be unwilling participants, primarily by leaving their home networks unsecured. More about that in a later post.) Data breaches do, however, pose a direct threat to individual users.

In the Identity Theft presentation, slides 12-14 summarize a few of the most egregious data breaches as of early this year. They are widely reported in the news. I’ve always used the Privacy Rights Clearinghouse as an authoritative list of all known breaches. This chart summarizes the astonishing total.
Privacy Rights Clearinghouse
https://blog.barkly.com/biggest-data-breaches-2018-so-far






Here is information from an interesting list of large breaches so far in 2018. I was aware of the
Exactis breach. The fact that 340 million records were breached was big news. As a marketer, I was annoyed by the fact that I had never heard of the firm, a large data broker with headquarters in Florida. Businesses like Experion and Exactis are carrying on business as usual, at least from the outside. Hopefully they are taking major internal steps to protect their systems and consequently their customers. There are not, however, any meaningful regulatory penalties for letting data leak out.

https://blog.barkly.com/biggest-data-breaches-2018-so-far




The largest breach occurred in India and the Barly (a security resources firm) blog tells the story in a way that makes clear just how easy it is to get personal data all over the world these days. India is the second largest internet market in the world (China is the largest)  and has a connected population of approximately 500 million. For comparison, the US has about 275 million users. Aadhaar is an agency funded by the Indian government that gives out supposedly-secure identification numbers, so the number of individual data records exposed, 1.1 billion, is considerably larger that the internet-using population.

 

 

 

What Can Users Do To Protect Against Data Breaches?


So enough of the mind-boggling statistics. What can we, as individuals, do? Sadly, we cannot prevent data breaches from occurring. Happily, though, we can take a number of simple steps to ensure that our data is not stolen or, if it is, that it is hard for the thieves to use.

I don’t recommend that individuals obsessively track data breaches, although there are good alert and newsletter publications like the one maintained by the Privacy Rights Clearinghouse. The national press will chronicle the large ones. The more local ones—and there are a surprising number of those—will be covered by local news outlets. The problem is that companies sometimes wait months, or even years, to make a breach public. That’s a huge disservice to their customers, but again there is no real penalty. When the breach is made public, many businesses notify their customers by email and also perhaps by letter.

The question really is what should I do if I learn of a breach at a business where I have accounts or where data is stored about me?

What To Do If a Site Has Been Breached


As in the Experian breach covered in the presentation, sites will usually provide steps to be taken after a breach. They will announce a page to be visited, hopefully within a few days. You should go there and follow the instructions, just as I did. The site will usually follow up with you in some way, offering anything from reassurance to free credit monitoring for a period of time. I hope they will not do what Experian did. Its actions can only be described as monetizing the potential damage from the leak they themselves allowed to happen

1. Change Your Password. The first step, which you should always follow whether the site tells you to or not, is to change your password. If you have multiple accounts on the site, be sure you change all the passwords. Make them as strong as possible. Passwords are the first line of defense and they should be treated seriously.
2. Change Your Security Questions. The security questions strengthen the protection around your data.
3. Enable Two-Factor Authentication. We are all familiar with two-factor authentication even if we don’t use it as often as we probably should. Your mobile phone offers the opportunity to sign on with a pass code each time you turn it on. When you sign in from your new computer sites that have active account protection will say they don’t recognize the user. This requires that a verification code be sent to another device, your land line or mobile phone for example. When the verification code is entered, the account becomes available.

How Far Should You Go?


These steps assume breach of a site that has information about you but that does not transfer funds on the site. That is essentially the lowest level breach from the user perspective. It is not good, but it is not the same as potential access to, say, credit card information.

If the data is otherwise publicly available—name and street address, for example—potential theft is not particularly threatening. Email addresses are a little more problematic, in part because you may get increased spam. Credit card information is sensitive, but credit cards have low limits for user liability, so the danger is not large. Account numbers for other financial services, banks in particular, may open the user to greater potential loss.

Most dangerous of all is the Social Security number or other national identification number. It only takes a name and SSN for a thief to begin opening accounts in the user’s name.

So take as many steps as the situation warrants. You can monitor news about the breach and the firm’s website to get current information.

You can sign up with a credit monitoring service if the situation seems to call for it. There are, however, other—free—ways to find out if there is suspicious activity fluttering around your accounts. I will concentrate on free steps if they are available and strong. If you sleep better at night by having a credit monitoring service, then by all means sign up for one.

Breaches vs. Hacks


This post has dealt with breaches, the theft of data from organizations. That does not necessarily mean that individual users. That is usually referred to as a hack. Hacks can occur as a result of breaches but also as a result of data theft from other sources, both online and offline.

I will soon deal with how to recognize hacks and the steps that should be taken in light of their more imminent threats.

Until then, stay safe!

Protecting Your Online Identity

This presentation was developed in March 2018 and will be updated from time to time. Until a new version is available links with relevant new information will be posted below.

For users who have not devoted much time to protecting their data, this is a good place to start because it covers basic essentials.


Why I'm Writing A Blog About Personal Data Protection

The subhead states the mission of the blog. I want to make key methods for protecting user data privacy and identify comprehensible to the m...