Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

How to be an Easy Hacker Target

October 27, 2016 by The T By D Team Leave a Comment

hacker

How to be an Easy Hacker Target

One of the most publicized items of the U.S. election (other than Trump’s alleged sexually inappropriateness), is the hacking of Hillary Clinton’s private server.

I’m actually surprised that this hasn’t gotten more press than it has, given the highly sensitive data & emails that have been leaked.  But, that aside, how did this happen?  How was this allowed to happen?

John Podesta is the Chairman of the 2016 Hillary Clinton presidential campaign (he also previously served as Chief of Staff to President Bill Clinton, and Counselor to President Barack Obama).  Podesta fell for simple social engineering.  He fell for one of the most common phishes that we see – a Google credentials phish.  

In Podesta’s case, the bad guys used a bit.ly link – something else we see all the time.  And the landing page for the credentials phish, probably looked similar to the one below:

google-credit-phish

How To Make Yourself an Easy Phishing Target:
  • Use a terrible password.  Use a common, easy-to-remember (ie. easy-to-guess) password.
  • Re-use that same password for multiple sites and/or accounts.  
  • Share your password with your coworkers, and/or assistants.
  • Ask an assistant to email you your password when you forget it.
  • Not turning on two-factor authentication
  • Not changing passwords after one account was known to be compromised.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in