Log In

Reset Password
BERMUDA | RSS PODCAST

Hackers and how to protect yourself from them

Cyber threat: Beware of the hackers

This article, the ninth of ten in our Fraud Awareness Series considers cybersecurity, more specifically hacking.

There are a number of different tools in the hacker’s toolbox, but this article will consider some of the most common and try to suggest some practical steps to avoid falling victim.

In the early 70s, significant advances in technology meant that more people were able to have a computer at home. Around the same time, a group of malicious PC users was created, known as hackers. Hackers are difficult to control, and whenever new securities are put in place e.g. to protect personal data, there will be people who look to circumvent them.

One of the most common forms of hacking is a program called Trojan horse. This program may appear to be harmless, like a music file, but once downloaded it allows the hacker complete access to your computer. It is generally a non-self-replicating malware program containing malicious code that, when executed, can cause loss or theft of data.

Most other viruses are self-replicating programs that attach themselves to other programs, like a small piece of software that piggybacks onto genuine programs. A virus may attach itself to a program such as a spreadsheet, for example, so that each time the spreadsheet is opened, the virus is run. Another common intrusion is known as a worm. Worms are like viruses but they can exist without the assistance of other programs. Keyloggers, work by sending everything you type to the hacker, giving them access to passwords and other sensitive data.

There are numerous ways to protect yourself from hacking. You should make sure that your antivirus software is up to date and only visit secure sites that start ‘https’ rather than ‘http’.

You should also be wary of e-mails from unknown senders and never click on a link unless you know what it is and who it is from. If you suspect that you or your company have been the victim of financial or data theft as a result of hacking it is important to consult a specialist that can clear any malicious software from your system, make recommendations to improve vulnerabilities, preserve electronic evidence, investigate the extent of the intrusion, and/or assist with the data and/or asset recovery process.

If you believe your online financial accounts have been compromised you should contact your financial institution immediately.

A local Certified Fraud Examiner can also assist you with considering the available options and whether to report the matter to the relevant local authorities.

KRyS Global is a boutique fraud investigation and asset recovery firm who can assist with investigations into different types of fraud. This article was written as a way to increase community awareness about fraud. For more information contact Mathew Clingerman, managing director, KRyS Global at Mathew.Clingerman@krys-global.com