The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into.
Cyber-security has its own set of misconceptions as well. Here are five.
Say it with me now: “Software alone is not going to stop cyber-crime, even a little.”
There is no more harmful notion than the one that leads people into doing whatever they want on their computers or smartphones because they downloaded a software update. While software has its benefits, they often have to do with containing damage, not stopping an attack.
The false sense of security fostered by the idea that software can protect anyone from the kinds of daily mutating, highly sophisticated attacks out there today is dangerous.
The idea that cyber-crime is just about credit card fraud is a pernicious misconception that, ironically, can lead to credit card fraud and other forms of credit-related crimes.
There is no right answer to the question regarding the most prevalent forms of cyber-crime. But by far the majority of the capers out there are focused on grabbing colossal amounts of personal identifying information from organizations that do business with millions of people or, alternately, stealing confidential business information that can be sold to the highest-bidding competitor. Sure, there are other forms of attack, some of them very much on the rise, such as ransomware schemes, but by and large the focus among cyber-criminals is on sellable information and making a lot more money than can be had from a credit pump-and-dump.
That said, the ways that stolen information can be used leads back to consumers and can very easily result in credit fraud, since stolen data can be easily purchased by identity thieves for next to nothing on the dark web.
If cyber-crime were only about making money, we’d all be a lot safer than we are right now.
Let that sink in.
Make no mistake, there are hordes of hackers out there driven by ideology. Many are far less interested in making money than in making money disappear or taking down the electrical grid or rigging an election. For them, mere monetary reward is not a motivation unless it is needed to facilitate an attack.
This is the stuff of nightmares and blockbuster Hollywood films, and there isn’t a thing most of us can do to stop any of it from happening.
In a world where the Stuxnet worm that was used to attack Iran’s nuclear program is quaint technology and detonating a hydrogen bomb would inflict less casualties than a cyber-attack that shuts off the power grid, having our credit ruined by a pajama-wearing identity thief is the least of our worries.
The myth that cyber-criminals don’t focus on businesses that aren’t at the top of the food chain can be debunked with one name: Target. The company was hacked by one remove. The criminals managed to get malware on a far-flung point-of-sale system by coming in the side door. They merely had to compromise a smaller HVAC vendor.
No matter how small the enterprise, it must have serious security protocols and a meaningful cyber-defense plan, lest it suffer an extinction-level event and potentially bring down a whole lot of other folks with it.
This is the biggest myth out there, in my opinion. Except, of course, that in the final analysis it is true: There is no way to stop every single cyber-attack.
That said, for many attacks, PEBCAK is the answer. Unfamiliar with this approach? It’s an oldie but goodie that anyone in IT will recognize, the letters forming an acronym that neatly states why countless attacks are successful. PEBCAK stands for Problem Exists Between Chair and Keyboard.
While it is true that cyber-threats abound, the only way to contain the pandemic and meaningfully push back is if everybody does what they are supposed to do. That is a big “if.” But one can hope, and while fixing the human problem is a Herculean task, it’s a worthy goal.
If you’re concerned you’ve been a victim of identity theft, it’s important to keep an eye on your credit as new accounts in your name or a sudden drop in credit scores indicate fraud has occurred. You can view two of your free credit scores, updated monthly, by visiting Credit.com.
This story is an Op/Ed contribution to Credit.com and does not necessarily represent the views of the company or its partners.
Image: PeopleImages
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams