• (800) 669-2022
computer services venturacomputer services venturacomputer services venturacomputer services ventura
  • HOME
  • TESTIMONIALS
  • ABOUT
  • PORTFOLIO
    • Logos
    • Web and Social Media
    • Print Media
    • Business Media
    • Ads
    • Photography
    • Video
    • Tech Work
  • SERVICES
    • Content Creation & Writing Services
    • Creative Services
    • Technology Services
      • Smart Home
  • BLOG
  • CONTACT
  • Privacy Policy
  • Terms and Conditions
cybercrime
Cybercrime – What is it and what can you do?
October 14, 2021
Online Shopping Safety Tips
Online Shopping Safety Tips
December 6, 2021

Cyber Threats You Should Know & a Few Tips

Cyber Threats

Cyber threats seem to be unrelenting and more and more dangerous every single day. While the internet connects us all and presents us with a wealth of information and services it is not without risk. Cyber attacks are constantly evolving and many criminals now use a combination of attacks to accomplish a single goal. We have touched on cyber attacks in other articles but here are a few more you should be aware of and a tip or two to help keep you safe online.

Social Media & Your Digital Footprint = Sharing is not caring

The things you share on your social profiles can be used by an attacker to steal your identity, hack into your accounts, or defraud you. Be careful what you share, where you share it, and with whom you are sharing it with. What do I mean – here are a couple of examples: Posting that you are leaving for vacation simply tells everyone that you are not home as well as how long you will be gone and how far away you will be. Posting about your children’s schools or after-school events and their schedules gives criminals a clear picture of who they are, what they look like, and where your family will be at certain times of the day. Get the point?

Social Engineering = Your outrage makes you easy to manipulate

Bad guys WILL use your own emotions and fears to control and manipulate you. Don’t fall for it. Click bait is called BAIT for a reason.

Mobile Devices = Easy to steal

Protect the information stored in your phone! Never leave your phone out where someone can grab it. Make sure you lock your phone… and don’t use easy to guess PINs such as 1234 or 0000.

Botnets

Botnet malware is a network of computers that have been compromised or hijacked. They give hackers the ability to control the infected devices remotely for a variety of reasons. They can steal your data, log your keystrokes, or use the machine for other illegal ends (such as sending SPAM or mining illicit crypto currency). They can also use these botnets to overload servers to knock websites offline. Your computer can become part of a botnet simply by being infected with the hacker’s virus.

The Dark Web

Yeah, it is real… and what it contains is downright scary. You’ll find everything from illegal drugs and gun sales, to illicit pornography, to stolen credit card and Social Security numbers, bank account numbers, and a lot more. The dark web is a part of the internet that is made up of hidden sites that cannot be accessed through conventional web browsers, such as you and I use daily. The sites on the dark web also use encryption to hide their visitor’s and owner’s information. Don’t let your personal information end up for sale on the Dark Web.

Passwords and 2FA = Better protection

Only use secure passwords that are easy for you to remember but hard for a hacker to guess or crack. Adding 2-factor authentication protects you even more… or use an app for even stronger protections.

How quickly can your password be cracked?

Here are the most recent numbers on how quickly a hacker can crack a password based on the composition of the password:

Number of CharactersNumbers Only   (i.e. 12298)Lowercase Letters Only   (i.e. ddopsy)Uppercase + Lowercase Letters   (i.e. GreDsy)Numbers + Uppercase + Lowercase Letters   (i.e. A4ggY7)Symbol + Numbers + Uppercase + Lowercase Letters   (i.e. Jy4#ff@L)
4INSTANTLYINSTANTLYINSTANTLYINSTANTLYINSTANTLY
5INSTANTLYINSTANTLYINSTANTLYINSTANTLYINSTANTLY
6INSTANTLYINSTANTLYINSTANTLY1 Second5 Seconds
7INSTANTLYINSTANTLY25 Seconds1 Minute6 Minutes
8INSTANTLY5 Seconds22 Minutes1 Hour9 Hours
9INSTANTLY2 Minutes19 Hours3 Days3 Weeks
10INSTANTLY58 Minutes1 Month7 Months5 Years
112 Seconds1 Day5 Years41 Years400 Years
1245 Seconds3 Weeks300 Years2K Years34K Years
134 Minutes1 Year16K Years100K Years2M Years
1441 Minutes51 Years800K Years9M Years200M Years
156 Hours1K Years43M Years600M Years15BN Years
162 Days34K Years2BN Years37BN Years1TN Years
174 Weeks800K Years100BN Years2TN Years93TN Years
189 Months23M Years6TN Years100TN Years7QD Years

Need a hand or hand questions? Contact TeCHS!

Share
0

Related posts

passwords leaked on the dark web
May 12, 2022

Do you use any of the 20 most common passwords leaked on the dark web?


Read more
tax identity fraud
March 15, 2022

Tax season scams & tax identity fraud – Tips to protect yourself


Read more
smishing
February 3, 2022

What is smishing and how can you guard against these attacks?


Read more

(800) 669-2022

Need a hand with your tech?

Give us a call!

GET OUR NEWSLETTER!

Want awesome tech tips & tricks sent directly to your inbox? Get our newsletter!

* indicates required





RECENT ARTICLES

  • Do you use any of the 20 most common passwords leaked on the dark web?
  • Tax season scams & tax identity fraud – Tips to protect yourself
  • Google it… like a pro!
  • What is smishing and how can you guard against these attacks?
  • The photos on your phone are irreplaceable – back them up!
© 2022 TeCHS. All Rights Reserved.