Recently, after watching a news story on the subject, my father, who recently turned 82 years old, asked me about what “hacking” was and why someone would do it. I struggled for a minute to explain it in terms he would understand while still giving him a rudimentary understanding of the technology.
It reminded me of a similar conversation I had with my great aunt in 1999, shortly before the Y2K turnover. At 91, she lived a fairly isolated existence in the Ohio Appalachian foothills and certainly not computer literate. But she was deeply concerned about the Y2K computer bug causing her to lose electricity, water and her savings.
I reassured her that there was nothing to be concerned about, and did my best to explain what was really going on, beyond the media hype, the volume of which was considerable when you take into account she had but one TV channel. However, satisfied with my explanation, she seemed never to give it another thought and the millennium switch came and went without incident.
The fact that she was worried at all was troubling and shows just how influential the media can be in exacerbating a problem. Today, we’re faced with a similar situation, demonstrated by my dad’s concern over hacking. So, just exactly who and what should you be worried about and why?
For those who don’t know, “hacking” refers to the act of using specialized programming that identifies and exploits weakness in the security of a computer system in an effort to either steal or expose confidential information, or just to prove it can be done. It is a crime and often the hackers are in another country.
These digital gangsters break in for a variety of reasons, mostly to steal and sell sensitive information, political records or financial information. Without getting into more deep technical and political motives, keep in mind that hackers aren’t interested in getting into your private computer.
Not to rain on anyone’s self-confidence, but you’re just not that important – unless you’re some celebrity or politician – for hackers to waste the effort. There has to be some gain in the end, although it might simply be the act itself, the accomplishment of breaking in.
Some hacked information is sold to other criminals who will use it for their own nefarious purposes. When performed against something like the marital cheating website, Ashley Madison, the hope is that there will be some big name to expose and embarrass. That leaves the potential for some celebrity or politician to pay handsomely to keep his or her name off of the publicized list, essentially using the information for extortion.
Most of the time, the average computer user is not directly at risk, but that said, you could still be vulnerable if a store or bank you frequent happens to be a target. The best advice is to read all correspondence from retailers and financial institutions.
If their systems are compromised, they will contact customers first – very quietly – before going public with the information, so as to limit panic among their patrons. You will be instructed what to do in the event of a hack and how to best communicate with the vendor for further information.
Another way to protect your own information with online accounts, and I can’t stress this enough, is to use strong, complex passwords. Often the data stored for online accounts does not include a visible password, even the website owners can’t help you if you lose it. So the more complex it is, and the more often you change it, the less likely a hacker will be able to gain access to your information even if they get in.
Hacking, as a criminal activity, has created a billion-dollar industry around the world, on both sides of cyber security. More than ever, specialists are being trained to combat cyber attacks and electronic infiltration on every level.
As cyber security becomes more sophisticated, so will the criminals who seek to break it. They are the nameless, faceless equivalents of the modern day Jesse James and John Dillinger. Each generation has its nemeses and cyber criminals are the current lot, intent on wreaking havoc with our digital world.
Gery L. Deer is an independent columnist and business writer. Deer In Headlines is distributed by GLD Enterprises Communications. More at www.gerydeer.com.