WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Whether you're online through a computer or a phone, you could at any point become a target for computer hackers.  Everyday people go online to check social media and email, but little do they know hackers could be keeping track of your every move.  

Hacker, Kevin Mitnick served five years for computer crimes that people continue to fall victim to.

It only takes one employee to open a link or email that could bring down a security system.

These are all vulnerabilities Mitnick and his ghost global team expose when hired by a business but there are simple ways you can deter cyber attacks.

If you are using a 1-2-3-4 or a-b-c password, you're making yourself more vulnerable to attacks.

Mitnick is recommending you create a complex password and get a password manager program and enable two-factor identification.
Also whenever you;re logged in be wary of free WiFi.

People can be looking at what you are doing on their WiFi network and vice versa so Mitnick recommends you use a virtual private network.

Nowadays even after tacking every precaution your information could end up on an online database, so keep a close track on your finances.

Mitnick also warns against free USB. drives which could have software used by hackers to gain access to your computer.

Mitnick is also an author who has written four books on his knowledge of keeping online information safe.

His latest book, The Art of Invisibility comes out February 14th, on Valentines Day.

Video: www.kgns.tv/content/news/hacker-412927543.html

Source: KGNS News

Topics: The Art of Invisibility, VPN, computer security, complex password, keynote speaker, password manager program, information privacy, two-factor identification, virtual private network, WiFi, cyber hacking, free USB drives, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg