• Follow McAfee NFT’s on Twitter
  • John McAfee NFT Documentary
  • McAfee Files
    • In The News
    • John Mcafee Arrested
    • John McAfee’s death
  • Crypto News
  • OpenSea
  • Trade Crypto
  • Crypto Exchange
  • Follow McAfee NFT’s on Twitter
  • John McAfee NFT Documentary
  • McAfee Files
    • In The News
    • John Mcafee Arrested
    • John McAfee’s death
  • Crypto News
  • OpenSea
  • Trade Crypto
  • Crypto Exchange
HomeOp-ed Washington “TimesThwarting hackers by ...
Previous Next

Op-ed Washington “TimesThwarting hackers by keeping it human”

Posted by: WhoIsMcAfee , December 21, 2013

target-data-breachjpeg-083ae_s800x549

 

Washington Times Dec 20 2013

By John McAfee

In recent days, Target customers were shocked to learn that since late November hackers have managed to steal the names, credit and debit card numbers, expiration dates and security codes from as many as forty million Target customers. Target customers should be very concerned, but they shouldn’t be shocked because dozens of stores, companies and government agencies have been hacked in recent years opening millions of Americans to identity theft, fraud and the possibility that sensitive personal information will be misused.

In just the last two years, hackers have gotten into the computers of J.C. Penney, 7-Eleven, Nasdaq OMX Group, JetBlue, Dow Jones and others and made off with similar information on 160 million of their customers. The hackers who successfully targeted Target could cost the US economy an estimated 4 billion dollars and the potential total cost of all these security breaches could be many times that amount. It has been estimated, in fact, that the total cost of these thefts to the US economy could be the equivalent of 450,000 average wage earners working for a full year.

That is a lot of money down the drain in an economy still struggling to recover from recession and the sad thing about it is that it wouldn’t have happened if security experts at these companies had thought well enough ahead to anticipate the nature of the attacks on their systems and put security measures into effect to thwart the hackers.

Many of the measures taken by companies and government security experts are either designed without anticipating the nature of the next assault on the system they are charged with protecting or without fully realizing that human beings are fallible and too often give hackers the very openings they are trying to eliminate. Preparing for the last attack, like military organizations that train for the last war is of limited value as is a strategy that ignores the human factor.

We have the technology today which can be utilized to at least keep institutions one or two steps ahead of the hackers if put in place and managed with an eye to what individual customers will and won’t do to assist in protecting their own and the institution’s data.

For example, in today’s world, cardholders can be easily empowered to control how, when and where their credit and debit cards can be used. Smart phones are ubiquitous and Apps can be developed for these phones that would allow individual customers tremendous flexibility by allowing them to disable their cards when they are not in use and enable them just prior to a purchase. The individual cardholder could be given the power to control his or her transaction limits, the types of purchases that can be made on the card as well as where and when it can be used. With such a system in place, hackers couldn’t use whatever data they might get their hands on without hacking in to the phones of individual cardholders, a daunting and virtually impossible task.

We know too that even those charged with protecting computer security within government security agencies often use dated technology or like those in the private sector develop systems that ignore the frailty of the human beings who use them. The idea that someone like Edward Snowden could waltz into the NSA, gain access to virtually every secret stored there and walk out with it shocked the nation and the world, but it happened. We learn almost monthly that state sponsored hackers have broken into supposedly secure government data bases either because of a human breach or because the agency is several steps behind the hackers in employing technology to protect the nation’s secrets.

In a few cases the people charged with putting complex systems in place either disregard or don’t appreciate the importance of protecting the data they will be protecting. This happens rarely, but those who built the government’s Obamacare on line system did so without giving much thought at all to the fact that hackers might gain access to the system and thereby to sensitive information on tens or even hundreds of millions of Americans. The stories about successful hackers stealing data from Target or 7-Eleven will seem minor by comparison to those we could see next year as these same hackers go after the Obamacare system as the mother lode of data on individual Americans.

Within public and private sector institutions, the human element must be factored in from the beginning. Human beings with the best of intentions make mistakes that can compromise the privacy of others. Simple human curiosity is a trait often used by hackers. Hackers frequently use curiosity to gain access to an institution’s security system, For example, a major European corporation was hacked recently by placing a USB memory stick on the ground next the parked car of one of the corporation’s security employees who found it and picked it up. It was labelled “weight loss” and the employee, who the hackers knew was struggling with weight issues, took it back to her office and inserted it into the USB slot in her computer to see if it might contain information she could use. The hacker’s program immediately took control of the company’s security system and millions of dollars’ worth of data was stolen.

Institutions must address the human element with the same thoroughness they put into the technological component of the security systems they devise to protect our privacy. Technological flaws, such as occurred with such glaring visibility in the Obamacare systems design and deployment are relatively rare, but human mistakes are common

If we don’t learn from our mistakes, what occurred at Target will become a daily threat to the privacy and financial security of every American.

Read more: http://www.washingtontimes.com/news/2013/dec/20/thwarting-hackers-by-keeping-it-human/#ixzz2o4l8jbGK

Follow Washington Times on Twitter : @washtimes on Twitter

 

Tags: John McAfee, target data breach, washington times

Share!
Tweet

WhoIsMcAfee

About the author

One Response to “Op-ed Washington “TimesThwarting hackers by keeping it human””

  1. sandwillow2
    January 1, 2014 at 1:53 pm

    I no longer believe technology can fix technology.
    If I have something important and private to say I’ll say it in person. If I need to keep a record of something important I guess paper and pen are the only way to ensure I will have it when I need it and no one else will know what it says. Photo’s will be printed instead of stored on a corruptible disk. ETC…………..

    Back to cash under the mattress or in the coffee can.

Popular
Recent
Comments
Tags
  • John McAfee METAVERSE 2 “F#ck McAfee” ...

    November 14, 2021

    PHANTOM PARASITE

    September 17, 2021

    IMPACT MEDIA releases Official John McAfee Documen ...

    July 30, 2021

    NO DOMAIN Chapter 2 – The Official John McAf ...

    July 19, 2021

    NO DOMAIN – The Official John McAfee Biograp ...

    July 18, 2021

    John McAfee’s Family Issues Statement To Spa ...

    July 15, 2021

    Note found in John Mcafee’s pocket

    July 13, 2021

    The John McAfee Documentary in NFT’s

    July 11, 2021

    John McAfee’s Voice Message After Neighbour’ ...

    July 11, 2021

    Janice Dyson McAfee was able to see John McAfee ...

    July 10, 2021

    An important message from John McAfee

    July 9, 2021

    Janice Dyson further fuels a possible conspiracy i ...

    July 7, 2021

    John McAfee I Did It My Way! NFT now avail

    July 6, 2021

    ‘A tortured soul’ – John McAfee& ...

    July 3, 2021

    John McAfee & Janice Dyson Were Not Married

    June 30, 2021

    Autopsy confirms John McAfee committed suicide in ...

    June 29, 2021

    John McAfee previously attempted suicide on Februa ...

    June 27, 2021

    John McAfee left a suicide note in his pocket

    June 26, 2021

    John McAfee’s ex-wife says he was NOT suicidal

    June 25, 2021

    John McAfee’s last hours in prison before su ...

    June 24, 2021

    VIDEO: John McAfee addressing Spanish court hours ...

    June 24, 2021

    John Mcafee found dead in Spanish prison cell

    June 23, 2021

    John McAfee Pump & Dump Fraud Indictment

    March 7, 2021

    John McAfee Arrested in Spain on US Criminal Charg ...

    October 6, 2020

    U.S. Securities and Exchange Commission (SEC) sues ...

    October 6, 2020

    ‘Love, sex, action, jail. Antivirus pioneer ...

    July 5, 2013

    The Prime Minister’s Directive

    February 4, 2013

    Channel 4

    February 20, 2013

    Dean Barrow & Belize Telemedia

    December 1, 2012
  • Traders debate whether Solana (SOL) is a buy now t ...

    June 30, 2022

    Cardano’s Vasil hard fork proposal submitted ...

    June 30, 2022

    Trader puts faith in crypto despite the failed fir ...

    June 29, 2022
  • I remember I first installed McAfee on my Windows ...

    September 29, 2016

    Americans are ignorant pathetic sheep - that's why ...

    August 6, 2016

    No one speaks out because Americans need a leader ...

    August 6, 2016
  • #IamJohnMcAfee $WHACKD 039metaverse039

Archives


         Copyright Who is Mcafee © 2021
  • Bitcoin Calculator
  • Contact
  • Donate!
  • Exchange Crypto Instantly
  • Frequently asked questions
  • Logout
  • Lost Password