ABC Action News - Time to Enhance Your Cyber Security

We’re long past the age where using a strong, complex password (without writing it down) was enough practice of security to stop most internet threats. But now is a new era of technology security, and along with it - new holes and exploits for experienced hackers to compromise your personal information, and even your intellectual property. On the case - Consumer Investigator, Jackie Callaway from ABC Action News 11:

Crypto currency trading and management has become a popular topic and investment amoung the world, with stories ranging from get-rich-quick, to retirement replacement strategies. In any regard, it’s new, it’s volatile, and most importantly - it’s centered around highly-sophisticated internet infrastructure and IT security practices. Put plainly, Crypto & Blockchain technologies perform (mostly math and financial) calculations too complex for humans (and basic programming) to conquer alone.

But what does this mean for the average user? Namely: the inner-workings and precision necessary to make Crypto equations work are vast and precise. Further, Blockchain and Crypto take accounting and reconciliation to another level, adding additional layers of validation and verification, making the model and use cases exponentially more secure. So, where does the security become limited?

 
 

Of course - once humans are involved. Computers are programmed to not make mistakes, but as social engineering and stories have shown the limit to IT security is frequently centered around (limited or non-existent) human efforts. Case in point - Secure accounts related to online banking and financials. Your weakest device (password) may not even be your greatest threat to your intellectual property or financial equity.

The latest cases of remote Crypto securities fraud stemmed from social engineering attacks made by remote hackers, who impersonated owners of smartphones (linked to compromised email accounts). Once account details were accessible via internet, the hackers exploited Two-Factor authentication verifications to successfully execute trades, posing as the account holder. This is just one of many threats you can fortify against using a Multi-Factor Authenticator mobile app, in place of 2FA text messages from Cellular providers.

 
 

Interviewee: Ryan Malize; Founder/CTO to Pinellas Computers. Follow more stories from ABC Action New’s Investigator - Jackie Callaway on her public Facebook. A special thanks for making Pinellas Computers the go-to source for Expert Technology insight! 🦾

Ryan Malize