You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.
In this situation, the Exchange company itself is the victim. They're numerous occurrences of this happening, and it is not the fault of the customer. The company either had outdated security protocols, practices, or holes in their IT infrastructure with outdated code. Here is a link that provides historical data on known breaches with crypto Exchanges https://cointelegraph.com/news/most-significant-hacks-of-2019-new-record-of-twelve-in-one-year.
This situation occurs more often than anything else. Whether you had poor Cybersecurity practices or were just the victim of a sophisticated attack when your account is compromised, and they log in as you in the Exchange account, you are liable, and dare I say, reasonably too.
When you repeat the same password or don't care about security measures, it's not the fault of the custodian to return any stolen assets. It's analogous to leaving your keys in your car while you go into the store to buy beer. If you came out and the car was gone, you wouldn't run back into the store and yell at the clerk that they owe you a new car, right?
I'm glad you asked! Please see the following article: https://itecsonline.com/post/crypto-wallet-and-how-to-secure-it
and check out this article: https://itecsonline.com/post/edr-security
The term SIM SWAPPING means that a hacker successfully impersonates you and asks your cell phone service provider to move your line (phone and SMS) to a SIM card in their possession. So how do they successfully impersonate you? Well, I won't go into those details but let me assure you it's pretty easy given that a lot of "sensitive" information is fairly easy to find online. Plus, with hacks like the infamous Equifax breach, most U.S.A. adult's information is easily accessible on the dark web.
Here's a hint: You have multifactor authentication (MFA) enabled so that when you log into your Binance/Coinbase/FTX account, you get a text message...
Call your mobile phone service provider and ask them to enroll you in their SIM SWAPPING protection plan. T-Mobile offers it for free for their customers, and it forces anyone to authenticate with a text message code BEFORE a SIM SWAP is validated. Ironic? Think about it. If you are a hacker and know my social security number, pin code, EIN, or whatever, call my provider. Before they follow your instructions, you have to have the original phone in your possession to give them the validation code.
Cloud computing has been around for quite a while but it took some years before it became part of everyday language. Starting out it might have seemed too esoteric for many companies, but it's hard to imagine our current technological world without the cloud.
On average, it takes 100 days for ransomware or malware to be detected with traditional network security systems due to their inadequate visibility and limited ability to analyze advanced threats. A lot of damage can occur over 100 days. Due to the advanced programming of EDR, the 100-day average of detecting ransomware or malware drastically drops to just a matter of hours or even minutes.
iTecs is your IT solution for your business’s remote and onsite managed IT service needs. iTecs has the expertise to guide and consult with businesses regarding which technology and services are necessary to run quickly and efficiently. After consulting with you on the technology needs of your business, iTecs will procure and employ the programs, then monitor and provide maintenance, such as patch management and updates, and be on top of any issue within the system if it were to occur. It should not be the responsibility of your business to be an expert in IT. Instead of worrying about becoming the best in IT to protect your business, gain peace of mind by outsourcing your IT needs to the best MSP by partnering with iTecs. We do what we do best, so you can focus on being the best in your industry and taking your business to the next level.