(844) 627-8267
(844) 627-8267

12 million hacked. Are you next? How to protect yourself, you work, your family | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


HONOLULU (KHON2) — We’re going to talk about a very important topic: security. It’s something everyone is thinking about, especially since there was recently a big lawsuit against a major cellphone company.

This company had 12 million pieces of data stolen! Ed Sun, founder of Sun Global Broadband who is an expert in security, is here to help us understand how we can protect ourselves, our families and our devices.

Get Hawaii’s latest morning news delivered to your inbox, sign up for News 2 You

So far, KHON2.com has covered the internet bubble that is coming to Waiʻanae to ensure internet equity is brought to Hawaii and what blockchain is. Now, we are going to take a look at why data security is so very important.

Why security matters

Recently, a major cellular carrier experienced a huge data breach. Hackers stole information from 12 million subscribers. This shows how important it is to protect our data. Sun emphasizes that people are always asking, “How do I protect myself and my family?” With so many smart devices around us, this is a crucial question.

Four key areas of security

Sun discusses four main areas of security that we need to focus on:

  1. Passwords and usernames.
  2. Data transmission.
  3. Virtual Private Networks (VPNs).
  4. Cloud protection.

1. Passwords and usernames

The first step in security is creating strong passwords and usernames. Sun suggests using different passwords for each device and avoiding easy-to-guess information like your social security number, address or birth date. Instead, make your password something no one can figure out.

Here are some of Sun’s tips for creating strong passwords:

  • Use symbols for letters (e.g., $ for S, ! for L, 0 for O).
  • Misspell a random word and add numbers and special characters.

“Some of the common things are putting a dollar sign for an S or putting an exclamation point for an L or, you know, putting a zero instead of an O,” Sun explained.

2. Data transmission

When we send data over the internet, it’s important to protect it. This data, or “internet packet,” can be secured using Blockchain technology. Sun explained that Blockchain keeps a ledger, or record, of the information sent and received. This ensures that both sides have matching records, which helps prevent tampering.

“So a lot of times the data can be secured by something called Blockchain. And there’s two types of ways to secure things by Blockchain,” Sun said. “The Blockchain really keeps a track of the information you’re sending and the information that’s received and it makes sure that both sides send and receive information that correlate.”

3. Virtual Private Networks (VPNs)

VPNs are used by large corporations and governments to protect their data. Sun talks about two types of encryption: protocol-free and key code encryption.

  • Protocol-free encryption doesn’t require a key code, making it safer because there’s no code that hackers can steal.
  • Key code encryption uses a code to scramble the data. However, if hackers get the code, they can access the data.

Sun explained, “A typical virtual private network uses something like a system that’s not protocol-free. So you actually have to transmit a key code across the network. And interesting enough, the key code can be hacked.”

Using both types of encryption together can provide stronger protection.

4. Cloud protection

Many companies store data in the cloud, which means it’s distributed across large data centers worldwide. Sun explained that the cloud isn’t just “in the air” but is made up of these data centers. It’s important to make sure that if one part of the cloud is hacked, it doesn’t affect the rest.

“Really what happens is large companies distribute where their data is housed in the cloud,” Sun said. “If part of the cloud is hacked, that part of the cloud doesn’t affect other parts of the cloud.”

To enhance security, Sun suggests using both protocol-free encryption and key code encryption for cloud services.

Real-world applications

Sun has experience with data security from his time at Homeland Security. After 9/11, they implemented a data-sharing network that combined different types of encryption. This system was a precursor to today’s Blockchain technology.

“One of the first bubbles was something done at MedStar for 14 hospitals to protect all patient records and also protect certain types of information from being included with other information,” Sun shares. This shows how important and effective these security measures can be.

Different types of security

Sun also talks about various types of security, including:

  • Financial Security: Protecting your money and financial information.
  • Medical Security: Keeping your health information safe.
  • Defense Security: Protecting military and defense information.
  • Intelligence Security: Keeping government secrets safe.

Each type of data has different rules about what data can be combined and who can access it. For example, DoD information can’t be mixed with medical information unless specific rules are followed.

Importance of configuration management

Another key concept Sun mentions is configuration management. This ensures that when data is no longer needed or has expired, the system notifies you so you don’t make decisions based on outdated information.

“Some of those things, they use a term called configuration management and they use a lot of that in terms of manufacturing and factory floor and global systems,” Sun explained.

Protecting personal and work information

As technology gets smarter, we need to stay vigilant. Sun calls these advancements “intelligent systems” or “artificial intelligence systems,” designed to make our lives better. By following the different security methods he describes, we can protect our personal, family and work information.

With Sun’s help, we now have a better understanding of how important it is to protect our personal, family and work information.

Get news on the go with KHON 2GO, KHON’s morning podcast, every morning at 8

By using strong passwords, securing our data with Blockchain, using VPNs and keeping our cloud data safe, we can stay secure in this digital world. Remember, security is about keeping our information safe so we can enjoy the benefits of technology without worry.

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW