May 17, 2024

4 Basic Mistakes Crybercriminals Can’t Wait To Exploit

According to Security Magazine, a cyberattack occurs every 39 seconds somewhere on the web. The most common targets are usernames and passwords. 

Most of these attacks occur because people leave themselves open to attack through general carelessness or because they don’t realize how even small things can lead to big problems. 

Fortunately, you have many options when it comes to protecting your personal and business data. You can create threat prevention plans, data backups and recovery, network monitoring, and more, but the truth is that your cybersecurity is only as strong as its weakest link. 

It’s that weak link that cybercriminals are poised to exploit. 

To help keep your network safe—whether business or personal—take a look at these four common mistakes people make and how you can avoid them.

Too simple or short passwords

A too-familiar Hollywood cliche is when a computer or network is “hacked” by someone guessing the password within three tries. Sometimes the password is “password” (the laziest option for both users and Hollywood screenwriters), or it’s something strongly associated with the password owner such as the name of a pet or phrase.

In the real world, too many people select easy-to-guess, simple, or short passwords that leave their computers, networks, banking accounts, and more open to attack.

Short and simple passwords may be easy for most people to remember, but they are also easier for cybercriminals to hack with brute-force attacks. These are attacks in which a hacker systematically tries many different password possibilities until they locate the right one. Sometimes this is done with a dictionary. Sometimes this is done with a database of popular passwords and password variants.

To make brute-force attacks less likely to succeed, here are a few safe password tips:

  • Make sure your password is at least eight characters long.
  • Avoid significant dates or names.
  • Create your password from a combination of letters, numbers, and special characters.
  • Use a password generator to create completely random passwords.

Repeat passwords

This is an understandable mistake. Given how many online accounts the average person has (according to a recent report by NordPass, it’s between 70 and 80), it’s no surprise people repeat passwords. Who can remember that many different passwords?

The problem is that many hackers realize that the Netflix password they found from a data breach could very well be the same password you use for your bank. Yes, banks often use two-step authorization and have other extra security measures, but what about your online water bill account? Or Xbox account? Do you have payment information saved at either of those sites?

So you see the problem. 

How should you address it? Here are some safety measures to try:

  • Don’t use the same password over and over. Mix it up as much as you can reasonably handle.
  • Use a password manager program to keep track of multiple accounts.
  • Change your passwords regularly.
  • Use unique, non-repeated passwords for accounts that hold the most sensitive information.

Careless use of public WiFi

While undoubtedly convenient, public WiFi can be a hazard when it comes to keeping your data secure. If you can connect to an unsecured WiFi network, anyone can. This leaves you vulnerable to:

Malicious hotspots: These are WiFi networks disguised as legitimate networks that, once you connect, allow hackers to monitor and record your online activity.

Man-in-the-middle attacks: This is sometimes accomplished with malicious hotspots. Sometimes it involves more sophisticated eavesdropping devices. In either case, it allows cybercriminals to track your data as it moves across the WiFi network from your device to the website or other service you’re using.

Unencrypted networks: Ideally, the public WiFi you’re connecting to has encryption in place so that only authorized users can interact with your data. Unfortunately, because you don’t necessarily know who set up the WiFi, you don’t know if encryption is being employed. Use any public WiFi with great caution.

Of course, the best way to keep secure is to avoid public WiFi at all. If you must connect, avoid using websites that could reveal sensitive information or look into using a VPN.

Sharing information online (like in those Facebook quizzes)

You’ve probably seen things like this on Facebook or Instagram: “What’s your Downton Abbey name? Take your mother’s maiden name and hyphenate it with your first pet’s name.” You might come up with Smith-Fluffikins. Hey! What fun! Why not share?

Why not? Because you’ve just made public the answers to two common security questions websites use to make sure you’re you.

A lot of these quizzes seem fun and whimsical, but many are also data-gathering tools for hackers. If you must play them, then enjoy, but don’t share the answers online. 

A large part of social media’s appeal is getting to know other people, letting them get to know us, and connecting. That’s not a bad thing, and I’m not saying you shouldn’t make connections with people, but always be cautious about what information you share online, even with photos. 

Remember when Kanye revealed his phone’s password live on camera during a White House visit? Be aware of what’s in the background of your shared photos. Avoid revealing vacation plans—especially if your house is going to be empty while you’re gone.

I hate to say it, but hackers and other bad actors love finding this type of information.

Merely being aware of these bad habits can go a long way in improving your approach to cybersecurity. A lot of it comes down to simple common sense. Look over the above suggestions and see if you can’t get any of them underway this very moment

You’ll save yourself time, aggravation, and money by making your accounts secure as soon as possible.

John Teehan

Founder of Jack's Online Tech, a blog looking at cybersecurity and cloud computing solutions for small-to-medium sized businesses. Also, the father of this site's namesake, Jack. Nice to meet you!

View all posts by John Teehan →