Steven Andiloro is the owner of Professional Security Solutions, a security company in North Carolina servicing customers nationwide!

Tag: Computer Security

Steven-Andiloro---Will-AI-Be-Safe-in-2018--compressor

Will AI Be Safe in 2018?

Artificial intelligence, or AI, has become incredibly popular in the last few years. And current industry standards show that the relatively new technology will only become more popular in the years to come. But how safe will it be? Whenever a new technology takes over and becomes a societal standard, we must always ask ourselves this question. And almost every time that we ask it, we are never really sure of our answer. When the Internet first became relevant, nobody could have predicted how unsafe it is if not properly used. Will AI follow a similar path?

A recent report from Ericsson, a telecommunications company, found that several consumers fully expect their devices to be considered some form of a human being in the near future. Some experts believe that we will no longer need to know our devices, because our devices will know us.

So what does this mean for security? Think of it this way: You want to know the latest showtimes for a movie so you ask your smartphone to find showtimes at local theaters. Your phone then uses your actual location to provide an answer. Or you want to purchase a gift for someone through Amazon and you ask your computer to make the purchase using your credit card and other sensitive information which are already stored on your device. These are real-world activities that will only become more common. And these activities share vast amounts of data. And in order for AI to become more advanced and more lifelike, it will need to send and receive large amounts of sensitive information almost constantly.

This naturally leads to vulnerabilities in sharing information. Areas where users’ personal information can slip through the cracks and fall into the hands of cybercriminals.

So how can we protect ourselves?

Luckily, we may not have to. The very technology that may be putting us at risk could potentially prevent any risk in the first place.

AI can become so advanced that it may, and very likely will, be utilized in cyber security software. And with machine learning, these technologies can become even smarter and prevent attacks and hacks from happening before they even begin.

AI is looking to make big waves this year. While some may fear what it will expose and put at risk, just know that it is capable of doing far more good than harm.

Steven Andiloro Bitcoin

How Can Bitcoin Help in Ransomware Attacks?

Unless you’ve been living under a rock in the last few months, you’ve heard of Bitcoin. It’s the latest craze sweeping the nation. Many people want to learn about the mysterious virtual currency and see if it can reap major fiduciary rewards. However, it is now being used for a completely different purpose.

 

Before I go any further, it might help to know what Bitcoin is. In short, Bitcoin is a form of cryptocurrency that is monitored on a peer-to-peer basis. It is not centralized by a governing bank or group and it is completely virtual. It gets a bit more technical and complicated when you really dive into it, but, for the purposes of this article, that’s all you really need to know.

 

So how can Bitcoin help in the fight against ransomware attacks? Well, quite simply, it can be used to pay off those ridiculous ransoms. For those unaware of how ransomware works, it is very simple; a computer that is infected with a ransomware virus is held “hostage” and its information is held for ransom. When the owner of the computer pays the ransom, then he or she gets access to the computer again and can access their information. That is the most broad definition of ransomware.

 

Because of the growing popularity of ransomware in recent years, some companies are considering to stock up on Bitcoin in order to pay off these large ransoms and continue with their business. When an entire network of computers are locked up and held ransom, it can be a headache to fix the system and bypass the virus. So, some companies are looking into simply using Bitcoin to avoid the hassle and pay the hackers.

 

Several British companies are utilizing this tactic. Because ransomware attacks are so commonplace, several British companies are informing employees to maintain a Bitcoin wallet in case of an emergency. Unfortunately, paying hackers can only provide a temporary solution. In fact, in most cases, even if a ransom is paid, the information isn’t guaranteed to be returned. But most companies prefer to stay quiet about online attacks.

 

Can Bitcoin be the ultimate solution to stopping ransomware hackers? Or will paying them off with digital currency be the same as feeding a stray cat? Only time will tell, but my guess is the latter.

Steven Andiloro- Two More of the Worst Online Hacks in History

Two More of the Worst Online Hacks in History

 

As a continuation of last month’s blog, I took a look at some more detrimental online hacks that have rocked our nation. Although preventive cyber security measures have increased, so have the capabilities of hackers. A lot of our personal information is exposed when we utilize online resources. Many of us know someone who has been affected by cyber attacks and may even know people involved in some of these larger scale incidents. Here are a few more noteworthy security breaches to hopefully remind you to stay safe online.

 

Target:

In 2014, retail mogul, Target, faced one of the worst data hacks our country has seen. The attack led to 70 million names, mailing addresses, emails, and phone numbers being stolen. Additionally, 40 million credit and debit card number, expiration dates, and CV codes were obtained by the hackers. The unique scenario of the hack made it a national news story. The breach in security took place over a three-week time period, which is why so many accounts were infiltrated. Many customers lost a great deal of trust in the company, and stocks did take a hit for a few months. From a security standpoint, Target had all of the right preventative measures in place. Yet, they neglected to react to the warnings they were provided. Many lawsuits filed against the company due to damages were dropped once damages were returned to customers. After discovering the breach, Target offered a year of free credit monitoring and identity theft protection to U.S. based customers.  A few customers received settlement funds from Target and the security measures have increased drastically. I’d be willing to bet that they won’t be ignoring any more warning signs in the future.

 

Sony Pictures

Those working in the entertainment industry already have a significant amount of their dirty laundry aired. You can imagine their emotions when they found out that Sony Pictures had fallen victim to a cyber attack. The attack was orchestrated by a North Korean based group self-titled “Guardians of Peace.” The group claimed their motive was the release of the film “The Interview,” a comedy portraying an assassination attempt on Kim Jong-Un. The breach consisted of the group receiving access to Sony employee’s personal information, emails within the company, and copies of then-unreleased films. As a result of the attack, Sony has heightened their cyber security efforts including the use of new software to house all company information.

Steven Andiloro Beginners Guide To Internet Security

Beginners Guide To Internet Security

The creation of the internet has led to many great technological advances in our lifetimes. Everything from research capabilities to video chatting with people around the world is feasible thanks to the world of being able to log online. Sadly, many people have dedicated their lives to creating viruses and cyber attack mechanisms to destroy and alter the way we use the internet. It is important for everyone to be aware of viruses that exist and best practices for keeping your digital footprint safe.

 

Preventative Measures

Before the hackers and viruses can make their way onto your devices, there are plenty of proactive methods for keeping your information secured. One of the best practices includes making sure a strong password is used for all properties. Many sites now have strength requirements (upper and lower case letters, numbers, special characters, etc.) but for those that have no requirements, it is still best practice to include as many features in a password as possible. Another tip, though tedious, is creating a different username and password for all login credentials. People who use the same passwords for all accounts are more likely to be hacked via multiple sites rather than just one. A great tool to utilize are apps such as Keeper, which creates a secure location to manage all of your passwords in case they are forgotten.

 

One of the largest sources of cyber attacks stems from improper use of certain online properties. McAfee shares that improper use of tools such as email and instant messaging can cause holes in your security walls, allowing viruses to be easily implanted in your system. Additionally when online shopping, make sure that there is a note on the checkout page, ensuring that the site and your information is safely protected from hackers.

 

Services

In addition to completing the above actions, there are many companies that provide online security for you and your devices.Top Company Compare ranks a few of the top contenders with brands such as Norton, Scanguard, and Total AV making the top 5 list. By purchasing one of these software systems, you are eliminating any additional risk factors that come along with intense online use. These products usually update automatically and are applicable to multiple devices, giving optimal coverage for any possible online invasions.

With the number of daily technological advances being made, there is always room for cyber attackers to grow their craft. Even those who sparingly use the internet, knowledge, and protection from any sort of breach or hack that may present itself is crucial. Continuously remaining aware of our internet practices will provide less of an opportunity for cyber disasters.

Powered by WordPress & Theme by Anders Norén