Quick Search

Active Bloggers

HBCU CONNECT HBCU CONNECT
Central State University class of 1995
Will Moss Will Moss
Hampton University class of 1995
Deanna  Johnson Deanna Johnson
Virginia State University class of 2028
Reginald Culpepper Reginald Culpepper
Clark Atlanta University class of 1998
luisa velasco luisa velasco
Spelman College class of 2017
rickey johnson rickey johnson
Other College... class of
TaQuan Ford TaQuan Ford
University of the District of Columbia class of 2026
Hija Chang Hija Chang
Bellarmine University class of 2021
agnes levine agnes levine
University of Baltimore class of 1993

The Perfect Mark: What Makes You a Prime Target for Cyber Threats

Posted By: Hayden Beck on May 04, 2017


For professional thieves looking to rob a home, there are some attributes that qualify a target. Like any professional, a thief is looking to maximize profits while minimizing risks. In other words, they are looking for the right combination of vulnerable and valuable. Hackers are no different; they avoid certain targets if they don’t have what they want or their defenses are too robust. So if you’re wondering if you might be at risk, here are some key indicators that you might be on a hacker’s radar.

What Makes You Valuable

We’re talking primarily about hackers acting as thieves here, so for the moment, we’re going to overlook those who have different motives.

To put it simply, if hackers are thieves, then information is the currency they are trying to steal. This falls largely into one of three categories: Personally Identifying Information (PII), actual currency, and other valuable information (like trade secrets).

PII is anything that can be used to steal an identity, or otherwise gain access to financial information. Credit card numbers, bank account information, and social security numbers are obvious examples, but often all it takes is a username or email and a password. Most people use the same username and password for multiple websites (including email), making it very easy to take login information stolen from one website and use it to gain access to another (we’ll talk about this more below). This makes data breaches that leak even basic user data very dangerous.

Actual currency is pretty simple. Sometimes hackers gain direct access to currency, whether that be realworld bank accounts, or virtual currencies like Bitcoin and game currencies. Like a virtual pickpocket, the hacker dips in, takes what they want, and absconds with the funds.

Money isn’t always the end goal, though, as multitudes of valuable information exist that aren’t directly related to bank accounts. Patent information, intellectual properties, secret recipes, and sensitive emails all represent things that can be stolen (typically from businesses) that have value—both to their original owner, and those who might steal them.

As for alternative motives, some hackers are looking to do things like vandalize your website, add your computer to a network of “zombies” (called a botnet), or merely to shut you down (Denial of Service).

What Makes You Vulnerable

Weak Passwords

Despite what frustrating password requirements may have taught you, the two deciding factors in password strength are length and randomness. Passwords that are too short (less than 8 characters) or too simple (like simply repeating the letter “A” ten times) are guessed in seconds, not minutes.



Keep in mind, it’s computers that crack passwords, not people, and they can guess a lot faster than we can. And as mentioned above, people often reuse passwords, making them even more vulnerable when password data is stolen.

Lack of Encryption

One of the biggest signs you’re ripe for a hack is a lack of encryption on sensitive data. Passwords and account info, transactions, email archives, business information—all these things can be stolen if they aren’t kept behind permissions walls. And if they’re stolen and not encrypted, there’s nothing stopping them from being used. Even user activity on the website is vulnerable, if the site isn’t hosted over HTTPS.

Lack of Oversight

Like a bank without a security guard, a website without security management is vulnerable. Cyber security professionals—whether in-house or outsourced through a third party—run security scans to check for holes, keep software updated, ensure data encryption, monitor access and check for intrusion, etc. Without proper oversight, you can be hacked and not even be aware. It’s much easier for thieves to make their getaway under those circumstances.

Locking the Door

Like a home robbery, cyber attacks are more likely—and more successful—if you “leave the door unlocked.” Proper security can prevent some attacks, minimize the damage of others, and, in some cases, turn hackers away empty handed. Here are some simple ways to boost cyber security:

Strengthen Passwords

Beefing up your passwords will go a long way towards increasing security. Insist your employees use unique passwords for their login, and don’t use anything shorter than 8 characters, though ten or more is preferable. The longer and more random the better. Strings of random words make for complex, yet easy to remember passwords. Password managers are also a good choice.

Train Users

No software can make up for an unwary user, so train your employees on the dangers of phishing, malware, and other forms of wetware hacking.

Hire a Professional

As we mentioned above, there’s no overestimating the value of having an expert caring for your system. Like a trusted mechanic or a family physician, having an individual or team dedicated to your business’s cyber security will keep you ahead of potential problems, and help you fix things when they go wrong. With cyber safety, there’s always a risk, but with the right team, you can face that risk with confidence.

Author: Danielle Adams is a freelance writer who works for a variety of publications including Fibernet. When not learning about cybersecurity and recent data breaches, she enjoys exploring her local coffee shop.
If you enjoyed this article, Join HBCU CONNECT today for similar content and opportunities via email!
Comments
Please Login To Post Comments...
Email:
Password:

 
More From This Author
Latest Blogs
Dominican Republic: The Caribbean Island of rhythm, resilience, and beauty

Dominican Republic: The Caribbean Island of rhythm, resilience, and beauty

The Dominican Republic is more than a Caribbean destination; it is a living heartbeat. It is a place where rhythm is not just heard but felt, where resilience is woven into the soul of the people, and ...more
Joel Savage • 49 Views • May 21st, 2026
The Myth of LinkedIn: Why Most Creators Never Strike Gold

The Myth of LinkedIn: Why Most Creators Never Strike Gold

Photo: A journalist looking at a laptop screen showing a LinkedIn warning message about leaving the platform, symbolizing restricted traffic flow. Many professionals, for years, believed that joi ...more
Joel Savage • 82 Views • May 20th, 2026
African Pygmies: Ancient forest tribes fighting for survival today

African Pygmies: Ancient forest tribes fighting for survival today

Photo: A small forest‑dwelling family in a Central African rainforest. The Pygmy peoples of Central Africa, for thousands of years, have lived deep within the vast rainforests of the Congo Ba ...more
Joel Savage • 74 Views • May 20th, 2026
The silent strength of ordinary people who keep our world standing

The silent strength of ordinary people who keep our world standing

A photo of four diverse workers, a male construction worker, a female nurse, a male sanitation worker, and a female food‑service worker, standing close together in unity and strength to keep the ...more
Joel Savage • 154 Views • May 17th, 2026
How fear and uncertainty are quietly changing human behavior

How fear and uncertainty are quietly changing human behavior

Photo: A thoughtful person sitting alone and reflecting on fear and uncertainty in a fast-changing world. Fear and uncertainty have become defining features of modern life. From economic instabilit ...more
Joel Savage • 152 Views • May 17th, 2026
Popular Blogs
Divorce in America in 2009 – What’s love got to do, got to do with it?

Divorce in America in 2009 – What’s love got to do, got to do with it?

Join Brother Marcus and the cast and the crew of the Brother Marcus Show live this Sunday evening on February 1, 2009 @ 8:00 p.m. for another hot topic in our community! “Divorce in America in 2009 ...more
Brother Marcus! • 71,375,548 Views • January 27th, 2009
VISINE ALERT!!!

VISINE ALERT!!!

Seemingly innocent medication such as Visine eyedrops are used by people to concoct a mixture with similar effects as a date-rape drug. When mixed with alcohol and taken orally, the eyedrops can l ...more
Siebra Muhammad • 119,701 Views • May 23rd, 2009

"Chain Hang Low" check out the real meaning of the Lyrics!

Recently there is a new artist out of Saint Louis that goes by the name JIBBS. Jibbs debut single "Chain hang low" has a history that most people are not aware of. The particular nursery rhyme that th ...more
Tyhesha Judge-Fogle • 78,188 Views • November 9th, 2006
HBCU Marketplace Gifts: Divine 9 Premium Fraternity / Sorority Playing Cards

HBCU Marketplace Gifts: Divine 9 Premium Fraternity / Sorority Playing Cards

Vendor: Charles Jones Item Price: $20.00 Price Includes Shipping: Yes - Shipping Included Item Description: Pantheon Series - Divine 9 - Premium Playing Cards (choose Gold Series or Silve ...more
Hija Chang • 62,947 Views • December 2nd, 2018
Black College Student Sentenced to 12 Years in Prison for Kissing a White Girl

Black College Student Sentenced to 12 Years in Prison for Kissing a White Girl

Albert N. Wilson, a former University of Kansas student, has been sentenced to 12 years in prison and a lifetime of probation after being convicted by an all-white jury of raping a white teen girl. Bu ...more
Will Moss • 55,885 Views • June 4th, 2020
Please Give Us a Like on Facebook!
Featured Members