• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

What Do Hackers Really Want to Do With Your Data?

February 7, 2018   Big Data

You know hackers want to steal your data. But do you know why? This article explains.

Understanding hackers’ motives is important for developing strong data protection strategies. If you don’t know exactly why attackers want to steal your data, it’s difficult to plan effective measures for stopping them.

Inside the Minds of Hackers: A List of Motivations

Following is a list of the most common motives for data theft today, along with tips on how to prevent various types of attacks.

blog banner SoR 2018 1 What Do Hackers Really Want to Do With Your Data?

Data Ransom

Sometimes, hackers want to steal your data so that they can hold it for ransom. This type of attack is a ransomware attack.

Ransomware attacks are one of the fastest-growing types of cyber attacks. The rate of ransomware attacks rose 250 percent in 2017.

Hackers usually execute ransomware attacks by gaining unauthorized access to data, then encrypting it or moving it and charging a ransom in order to restore your access to it.

The best way to prevent ransomware attacks is to make sure that access to data is restricted by strong access controls. In addition, making frequent backups of data can help. If you have your data backed up on servers that hackers can’t access, you won’t have to pay a ransom to get it back in the event that someone takes control of it.

Identify Theft

Data breaches like the recent theft of 3 billion accounts’ worth of data at Yahoo! are designed to steal personal information.

Attackers can then exploit that information to break into other accounts, attempt to steal identities and so on.

As an end-user, the best way to protect yourself against this threat is to avoid using the same password for multiple accounts, so that if an attacker steals your password for one service, he won’t be able to use it to break into another one.

For similar reasons, you should be careful about how you configure password recovery questions, which can do more harm than good.

hacker 1944688 960 720 600x What Do Hackers Really Want to Do With Your Data?

Meanwhile, if you are an organization that is responsible for overseeing data that could be used for identity theft, you can mitigate the risk of identity theft by resisting the temptation to collect unnecessary personal information.

You can also spread data across multiple storage locations so that a breach of one data set does not provide attackers with complete account information.

And you should design strategic data retention policies. You want to store data for as long as you need (and make sure you meet compliance requirements in that respect), but avoid keeping it around longer than necessary, because unnecessary data storage is a security risk.

Stealing Infrastructure

Servers and storage arrays are expensive. Some hackers want to break into your systems so that they can store data and host applications on your infrastructure, instead of paying for their own.

One way to mitigate the risk of this type of attack is to avoid exposing infrastructure to the public internet unless necessary. If hackers can’t see how much infrastructure you have, they’ll be less likely to want to take control of it.

Of course, firewalling off your internal infrastructure is no guarantee that hackers won’t still hack it. They might find ways to get past your perimeter defenses. But as a best practice, your public-facing services should be limited to those that strictly need to be public-facing.

Just Because

Unfortunately, some attackers want to steal your data just to prove that they can. They are not motivated by monetary gain, access to free resources or the ability to steal your users’ identities.

They simply want to prove to themselves – and their hacker friends, perhaps – that they can break past your defenses.

The greater your company’s reputation, the more tempting it is for attackers to show that they defeated your security measures.

There is no particular way to respond to these types of attackers. You simply need to follow data security best practices in general. Monitor your systems for signs of attack, lock down access control and avoid unnecessary attack vectors.

Download our 2018 State of Resilience Report to see how organizations are prioritizing security risk mitigation along with compliance and other key data availability initiatives.

Let’s block ads! (Why?)

Syncsort + Trillium Software Blog

data, Hackers, Really, Want
  • Recent Posts

    • Lucas Brothers To Write And Star In Semi-Autobiographical Comedy For Universal
    • NortonLifeLock’s AI-powered smartphone app blurs out sensitive information in photos
    • WHEN IDEOLOGY TRUMPS TRUTH
    • New Customer Experience Needs and Commerce Trends for 2021
    • A data transformation problem in SQL and Scala: Dovetailing declarative solutions
  • Categories

  • Archives

    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited