Sunday, November 7, 2010

Lies in technology

Have you ever felt that the information posted online may be lies? Of that the information is posted to get you to open something that can make your information less safe? If not, you should really rethink that. Information is not always correct on the internet.  Just think about it. Anyone can make a website and put any information on the site that he or she wants. There is nothing to protect you from the lies. But you also have to worry about the people who know how to hack into your websites and place information on your website that would ruin your reputation as well as cause mountains of trouble.
A great example of how these hackers can destroy everything you work for is Mr. James Udohs story. Mr. Udoh started a small scale online marketing business in which he sold information products and help his clients in the advertising of their blogs, products and services for a specific fee. But his business was hurt when someone hacked into his website and began posting negative information about his clients for the public to view. Mr. Udoh swears that he had never given out his password to a third party before. Some of his clients went so far as to threaten to take him to court over this offending information that was published on his website. He lost all of the clients.
Since it began, the internet has transformed from being just a scientific network into a global platform that enables all types of businesses to reach their customers with just the click of a few buttons. Although these businesses are helped by this new invention, these same businesses are facing the increasing threat of hackers who have gained the knowledge to access the important information. Their intention is to defraud. But one thing that hackers can do that may not only destroy your reputation or business but also you computer are viruses. There are currently an estimated 58,000 computer viruses that exist worldwide. But there are approximately 500 new viruses born each month.
According to an ICT Security and Risk Management expert, there has been a 65% increase in the security threats to information systems within the last few years.
You may ask how hackers can break into a company’s system, but they are usually very thorough in their investigation. They may call looking for advice, offering flattery in the attempt to gain the employees' trust. They use this connection to talk their way into getting information about the security and programs your company has in place. They sometimes prey on the employee's confidence in the network in order to gain some of the specific details and shortcomings about your system operations. By using social engineering to obtain even small amounts of information about how your system operates and what programs you use, the hackers can run software on their end that will not only give them greater detail on your system, it can show them how to get inside. manipulating an individual isn't the only social engineering method hacker’s may use. Some hackers are far more direct.


who would have thought that getting access to a  company's system could be so easy, but it can and does happen. Using these tricks are actually quite common.

If you want to read more about this subject you should go to:
http://www.punchng.com/Articl.aspx?theartic=Art2010042816731


I hope you enjoyed this blog!
Until next week,
Elizabeth.


This blog is prepared by a paralegal student as a class project, without compensation. The content of this blog contains my opinion, and is offered for personal interest without warranty of any kind. Comments posted by others on this blog are the responsibility of the posters of those messages. The reader is solely responsible for verifying the content of this blog and any linked information. Content, sources, information, and links will most likely change over time. The content of this blog may not be construed as legal, medical, business or personal advice 

No comments:

Post a Comment