Cyber Security Articles & News

WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Whether you're online through a computer or a phone, you could at any point become a target for computer hackers.  Everyday people go online to check social media and email, but little do they know hackers could be keeping track of your every move.  

Hacker, Kevin Mitnick served five years for computer crimes that people continue to fall victim to.

It only takes one employee to open a link or email that could bring down a security system.

These are all vulnerabilities Mitnick and his ghost global team expose when hired by a business but there are simple ways you can deter cyber attacks.

If you are using a 1-2-3-4 or a-b-c password, you're making yourself more vulnerable to attacks.

Mitnick is recommending you create a complex password and get a password manager program and enable two-factor identification.
Also whenever you;re logged in be wary of free WiFi.

People can be looking at what you are doing on their WiFi network and vice versa so Mitnick recommends you use a virtual private network.

Nowadays even after tacking every precaution your information could end up on an online database, so keep a close track on your finances.

Mitnick also warns against free USB. drives which could have software used by hackers to gain access to your computer.

Mitnick is also an author who has written four books on his knowledge of keeping online information safe.

His latest book, The Art of Invisibility comes out February 14th, on Valentines Day.


Source: KGNS News

Topics: The Art of Invisibility, VPN, computer security, complex password, keynote speaker, password manager program, information privacy, two-factor identification, virtual private network, WiFi, cyber hacking, free USB drives, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Password Spraying Attacks: Technique and Prevention

Many organizations have cyber security measures in place to prevent threat actors from breaching defenses and launching their attacks. However, there ..

Read more ›

Understanding the Main Types of Penetration Testing

You may have heard about penetration testing, and have decided to dig a bit deeper to see if this cybersecurity testing can help your organization aga..

Read more ›

4 Signs Your Organization Needs Red Team Penetration Testing

According to a recent poll conducted by PwC, executives believe that mandated disclosures, tests of resilience, and pressure to get data security and ..

Read more ›