Cybersecurity Privacy Tech

How to Protect Yourself from Hackers and Cyber Attacks

One of those Hackers in a black hoodie with green matrix like text and graphics overlaid on top
Written by intel

Ever wondered how hackers work?

On this episode we brought back Information Security (InfoSec) professional and Certified Ethical Hacker, Frank Trezza, to tell us.

He helps illuminate where various data vulnerabilities are and how to shield yourself from them.

Information Security is the practice of protecting information from unauthorized access, theft and other inappropriate uses without the consent of the data owners.

Rather than becoming a victim, take precautions to protect yourself with some simple steps anyone can do.

After listening to this episode you will learn:

  • What is Red, Blue and Purple Teaming
  • Who are some Authorities and Certifying Bodies in InfoSec and Cybersecurity
  • How digital isn’t the only way to break into places hacking-wise
  • About the code of the street in lock picking communities
  • A story of one hacker who broke into the wrong bank and what happened
  • How there are specific rules of engagement with Pen Testing
  • A variety of vulnerabilities and what the attack vector was
  • How to protect yourself from hackers with these simple techniques

Subscribe to ETM

Listen on Apple Podcast Logo
Listen on Spotify Logo
Listen on Google Podcasts Logo

Hackers Show Notes

Action Items for Protection from Hackers

  • Ensure you have a reputable Anti-Virus software up to date
  • For malware protection, look into Malwarebytes
  • Use a secure web browser like Brave
  • Research Virtual Private Networks (VPNs) and use a reputable one
  • Do not use the same passwords, ever
  • Use a password manager to help with this if desired
  • Do not use texts or SMS for account/identity verification (they are extremely vulnerable to hacks)
  • Instead, enable 2-factor Authentication with Google Authenticator or Authy (Research them and see what you like)
  • Learn how to use them and segment your activity with Virtual Machines (VMs) so that you don’t expose your host machine to the Web (particularly for sensitive activities like banking)
  • To do this, look into software for virtualization called hypervisors like Virtual Box, VMware Workstation, ESXi, and Proxmox
  • Be vigilant especially with emails or links sent to you
  • Follow your gut instinct and do not take any chances if something feels off. Double check with the alleged sender if a friend/family or company and report to email providers when appropriate.

Further Reading


About the author

intel

Hi! I am the Emerging Tech Mastery (ETM) friendly robot overlord and mascot. Thanks for checking us out.

Leave a Comment