Saturday, May 18, 2024
31.0°F

Dangers of online open networks

by Daily Inter Lake
| March 31, 2015 9:00 PM

Following the recent cyber security workshops sponsored by the Flathead County Sheriff’s Office, Deputy Sheriff Travis Bruyer expanded on some of the dangers that U.S. Secret Service Tadd Down raised in his presentation. Bruyer’s concerns about data breaching apply to anyone using open source networks — not just merchants. 

“If your computer [at home or at work,] doesn't have a good firewall or security, it can fall victim through an open source regardless of its location or the suspect’s location,” said Bruyer.

Examples of open source networks are wi-fi hotspots such as fast food restaurants, coffee shops or hotels. Bruyer explained it this way: If a customer is online in a hotel — or online anywhere on a weak system (which open networks are) — a cyber criminal online anywhere in the world could potentially obtain the person’s information with a hacker program, also known as a back door.

“A back door is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes [such as updates]. However, attackers often use back doors that they detect or install themselves to exploit the program or plant a bug,” Bruyer said. Despite different wireless carriers and different locations, “once you are online, you can be a target.”

For small business owners, their point-of-sale (POS) transactions should be done on a closed source network with encryption. For those businesses who may offer Internet services to their customers, they should designate a separate computer for their own business. And under no circumstance should they use that designated computer to surf the Web where they could pick up viruses and cookies — malicious software of the Internet. “Be leery of downloads and pop-up ware,” Bruyer said.

Bruyer also recommended using reputable information technology people, but it is a “buyer beware” market. And, you should find malware that meets the needs of your business to protect the computer and confidential information.

Bruyer urged that people review bank statements and check the tips from receipts.

Bruyer also suggested that people who stay at hotels keep the digital key cards when their stay is over. On one occasion, he scanned his key card with a card reader and learned all the personal information and credit card information from the previous tenant because it hadn’t been digitally wiped clean by the hotel staff. 

Bruyer also spoke of one of the biggest causes of Internet breaches: weak passwords. Either people with Internet access through their cable system have none at all (creating an open source network) or they use the standard factory default set password that came with the router such as CenturyLink or Belkin. Common examples of the top passwords include “password,” “123456,” “abc123,” “admin” or “admin123” or combination of. Anyone within distance of the router, can try and use those factory set passwords to gain access. And if you haven’t changed the factory setting, they will. 

Not only should you have a strong password with upper and lower case letters, numbers and special characters with a minimum of eight characters, but change the password often, Bruyer recommended. This includes updating laptops, cellphones and other portable devices such as Kindles, blackberries and iPods. “Think about who you give passwords to,” he said. It’s not uncommon to share a password with a guest, but change it when that person leaves.

Looking to the future, Bruyer said the biggest data breech trends are in health care with ID fraud on the rise. He strongly recommends protecting your children’s Social Security numbers because — with no pre-existing credit history — they are a valuable commodity to a would-be thief.