{"id":1990,"date":"2016-10-04T11:04:04","date_gmt":"2016-10-04T16:04:04","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=1990"},"modified":"2018-06-26T12:04:08","modified_gmt":"2018-06-26T17:04:08","slug":"6-common-tactics-hackers-use-and-how-to-thwart-them","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/","title":{"rendered":"6 Common Tactics Hackers Use and How to Thwart Them"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1991\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-300x225.jpg\" alt=\"Security breach attack\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>As the Internet gets faster and better, there are benefits and drawbacks that come with the advances. One downside to global connectivity is the rise of <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/11-ways-to-tell-if-youve-been-hacked\/\" target=\"_blank\">hackers<\/a>, the digital assailants who can compromise an entire system with dangerous code. Hackers present a host of problems for Internet users both personally and professionally, so it\u2019s important to keep yourself safe from them. In this article, we\u2019ll discuss six methods hackers often use and how to avoid falling victim to these tactics.<\/p>\n<p><strong>1. Scripts and malware.<\/strong> One of the most common <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/4-inexpensive-ways-to-enhance-it-security\/\" target=\"_blank\">security threats<\/a> is the malicious code hackers use to deliver a \u201cpayload.\u201d This payload, in the form of a small program, can do a range of harmful things from logging personal info to crashing a PC. The best way to avoid this is to avoid downloading and running untrusted executables while also maintaining up-to-date anti-virus software.<\/p>\n<p><strong>2. Fake Wireless Application Protocols (WAPs).<\/strong> Public wireless Internet can be useful when traveling, but hackers will take advantage of this by setting up fake networks in a public area. When a user connects to it, personal information like passwords and data become available to the hacker. You can avoid this by using trusted private connections.<\/p>\n<p><strong>3. Keyloggers.<\/strong> Easy to get but hard to remove, keyloggers work like Trojan viruses, inserting themselves into unprotected systems. Once there, performance often suffers while keystrokes are recorded and sent to a malicious third party. To keep yourself safe, never download strange files and do thorough PC scans if you suspect something\u2019s amiss.<\/p>\n<p><strong>4. Scam emails.<\/strong> While typically easy to catch, there are numerous official looking emails sent to people by hackers. You might suddenly get an email about your PayPal account, stating a vague issue has come up. The false email won\u2019t include specifics, but it will look like the real thing. The unsuspecting usually click links in the email, leading them to dangerous executables. Firewalls and protective services can stop some of these emails from reaching your inbox, and practicing caution towards those that slip through the cracks can <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\">keep you safe<\/a>.<\/p>\n<p><strong>5. Bait programs.<\/strong> These programs tend to promise various features for free, like virus scans or performance enhancement. However, once the sneaky program \u201cruns,\u201d it actually loads its own payload into the system. This was a common tactic for trying to sell shoddy anti-virus programs. Checking the rating and researching the program is the best way to keep safe.<\/p>\n<p><strong>6. Simple passwords.<\/strong> By and large one of the easiest ways to be compromised, hackers will start guessing basic passwords for entry into systems. They rely on factory defaults and careless individuals, allowing them to get simple login info without effort. Always maintain a complex password system and, if needed, change it every month or so.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the Internet gets faster and better, there are benefits and drawbacks that come with the advances. One downside to global connectivity is the rise of hackers, the digital assailants who can compromise an entire system with dangerous code. Hackers &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"yoast_head":"<title>6 Common Tactics Hackers Use and How to Thwart Them<\/title>\n<meta name=\"description\" content=\"Hackers pose a serious threat to Internet users both personally and professionally. Here&#039;s how to fend off the most common cybercriminal tactics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Common Tactics Hackers Use and How to Thwart Them\" \/>\n<meta property=\"og:description\" content=\"Hackers pose a serious threat to Internet users both personally and professionally. Here&#039;s how to fend off the most common cybercriminal tactics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-04T16:04:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"6 Common Tactics Hackers Use and How to Thwart Them\",\"datePublished\":\"2016-10-04T16:04:04+00:00\",\"dateModified\":\"2018-06-26T17:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\"},\"wordCount\":467,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\",\"name\":\"6 Common Tactics Hackers Use and How to Thwart Them\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2016-10-04T16:04:04+00:00\",\"dateModified\":\"2018-06-26T17:04:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Hackers pose a serious threat to Internet users both personally and professionally. Here's how to fend off the most common cybercriminal tactics.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Common Tactics Hackers Use and How to Thwart Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"6 Common Tactics Hackers Use and How to Thwart Them","description":"Hackers pose a serious threat to Internet users both personally and professionally. Here's how to fend off the most common cybercriminal tactics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/","og_locale":"en_US","og_type":"article","og_title":"6 Common Tactics Hackers Use and How to Thwart Them","og_description":"Hackers pose a serious threat to Internet users both personally and professionally. Here's how to fend off the most common cybercriminal tactics.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2016-10-04T16:04:04+00:00","article_modified_time":"2018-06-26T17:04:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"6 Common Tactics Hackers Use and How to Thwart Them","datePublished":"2016-10-04T16:04:04+00:00","dateModified":"2018-06-26T17:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/"},"wordCount":467,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Knowledge Base"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/","name":"6 Common Tactics Hackers Use and How to Thwart Them","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2016-10-04T16:04:04+00:00","dateModified":"2018-06-26T17:04:08+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Hackers pose a serious threat to Internet users both personally and professionally. Here's how to fend off the most common cybercriminal tactics.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/6-common-tactics-hackers-use-and-how-to-thwart-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Common Tactics Hackers Use and How to Thwart Them"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1990"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1990\/revisions"}],"predecessor-version":[{"id":1992,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1990\/revisions\/1992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}