Cyber Security Articles & News

WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Whether you're online through a computer or a phone, you could at any point become a target for computer hackers.  Everyday people go online to check social media and email, but little do they know hackers could be keeping track of your every move.  

Hacker, Kevin Mitnick served five years for computer crimes that people continue to fall victim to.

It only takes one employee to open a link or email that could bring down a security system.

These are all vulnerabilities Mitnick and his ghost global team expose when hired by a business but there are simple ways you can deter cyber attacks.

If you are using a 1-2-3-4 or a-b-c password, you're making yourself more vulnerable to attacks.

Mitnick is recommending you create a complex password and get a password manager program and enable two-factor identification.
Also whenever you;re logged in be wary of free WiFi.

People can be looking at what you are doing on their WiFi network and vice versa so Mitnick recommends you use a virtual private network.

Nowadays even after tacking every precaution your information could end up on an online database, so keep a close track on your finances.

Mitnick also warns against free USB. drives which could have software used by hackers to gain access to your computer.

Mitnick is also an author who has written four books on his knowledge of keeping online information safe.

His latest book, The Art of Invisibility comes out February 14th, on Valentines Day.

Video: www.kgns.tv/content/news/hacker-412927543.html

Source: KGNS News

Topics: The Art of Invisibility, VPN, computer security, complex password, keynote speaker, password manager program, information privacy, two-factor identification, virtual private network, WiFi, cyber hacking, free USB drives, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›
tech-texture-bg