Marketing Team

By: Marketing Team on December 26th, 2020

Print/Save as PDF

How Did I Get Hacked? Tips for Staying Safe Online!


Millions of people have their accounts compromised every year. Attackers are always on the lookout for vulnerable data and are constantly changing their tactics. This can make it harder and harder to keep your valuable data safe. But one of the best ways to stay safe is learning how you got hacked in the first place so you know how to avoid it in the future.

1. Phishing Attempts! 

multiple cards phishing scam

Phishing is an old threat that comes in numerous forms. At its core phishing is when someone creates a link that tricks you into entering private information when you thought it was safe.

This could be in the guise of a fake Facebook Login, someone faking email credentials, pop-ups, links saying that you have “WON!” something.

The tactic is to make you think that you are entering login information, passwords, or other valuable data into an area that you think you can trust.

Phishing is not usually a localized attack. It is usually a tactic that is used to reach a broad audience, basically waiting for someone to fall for the trick.’

It’s like casting a line in the water and waiting for a fish to nibble. Phishing tactics don’t need to be the most advanced attacks, because eventually someone will click that link or enter a password. All the attacker has to do is wait for that nibble.

Once they are into your account they can use any kind of malware or ransomware to attack your system. Phishing is the way that you give them your password. The other software is how the actual attack is carried out.

Learning about new and emerging phishing tactics is one of the best ways to stay ahead of the curve. Attackers change their strategies often, as we have even seen many new phishing attacks that have come with the COVID Pandemic.

2. Brute Force Entry

This is when a program is created that tries, with force, to get into your account. This is usually done by using software that is designed to try and crack your password.

It basically has a detailed dictionary of popular passwords, phrases, and just about every word combination that a human can be expected to know. These programs then run through all the possible combinations and try to break your password.

It's frightening how fast a good program can break most normal passwords. Brute Force Entry is a growing problem that people do not take seriously enough.

It’s extremely important to take the time to protect your password from such attacks. Brute Force entry programs are getting more powerful every day and most people do not update their protection procedures.

Take the time to protect yourself before you lose everything.

3. Real World Threats and Social Engineering

sim swap

This is more like phishing in the real world. Phishing attacks are usually malicious emails or links that make you give up information on the digital world.

But there are growing threats in the real world too. There is a growing number of social engineering and real-world threats that challenge people’s cybersecurity every day.

Its amazing what kinds of details people are able to gather through social engineering. Many good attackers will be able to find out enough personal information to trick security into thinking it’s the actual person’s account. 

How hard is it to find someone's high school teacher’s name or the name of an old pet through an Instagram post?

Once they have this personal information they are able to use techniques like Sim Swap attacks that lets them take over control of your account.

Once they are in your account it is especially easy to steal money, more data, attack your business, or cause more trouble.

This is why its so important to keep private information even when you are not on the web.

It’s always good to remember that curiosity killed the cat.  Another common tactic is for attackers to leave things like flash drives in a place that someone might find it. They count on someone eventually plugging it in, and accidentally installing a malware device that was on the flash drive.

This kind of thing happens every day!

Remember that cybersecurity is not just about having a good password. Good security online is about taking all the necessary steps to protect yourself from all the sneaky attacks that are out there.

Black market ransomware has become an entire black market and there are a growing number of people who want to take the easy way and get their money from attacking others. Take the time now to protect yourself, contact us today!

3 Types of Cybersecurity Solutions your Business Must Have