Would you like to know the simplest and most effective ways to get hacked? OK – this post is obviously sarcasm (please don’t take this advice!). However, sometimes a little humor helps the issue really sink in. So in that spirit, here are the best ways our organizations can get hacked these days:

Don’t Train Your Users on Phishing Techniques

It Took Google One Hour to Shut Down Massive Self-Replicating Phishing  Campaign

Most of the successful hacking attempts these days start with phishing. An email, a text message, or through some other messaging app which looks legitimate but is meant to steal your credentials or install malware. If you want to get hacked, this is by far your best chance! By simply not doing anything (such as training your employees), you can rest assured a phishing attempt will happen. And most likely, it will work.

Use Passwords That Are Easy to Remember or Are Reused

Tweak the colours of the password indicator [#2311279] | Drupal.org

Brute force software can be found for free on the web these days. If there is no company policy (or the policy isn’t enforced) on using difficult passwords, you can be confident it’s probably a matter of time before an easy password is hacked using a brute force attack. And even if difficult passwords are used, if they are copied across multiple apps and websites – have faith in the dark web to eventually hack one of those sites and share the passwords with other cyber criminals.

Don’t Setup MFA

What Is Two-Factor Authentication? Questions and Answers

If we can assume that phishing attempts and password leaks are a reality of our modern world, then keeping your accounts unprotected via single-factor authentication methods is an excellent way to hand cyber criminals the victory. When they only need your credentials and don’t need your phone as well to log into your account…well that’s a low maintenance hijack where we come from.

Keep Using Old, Tired, Out-Dated On-Premise Software With Tons of Vulnerabilities

Latest Ms Dos GIFs | Gfycat

That Exchange server you have in the closet? Do you know when it was originally developed? What about that ERP system, EMR system, Core banking system, phone system? They were all developed in the 1980s or early 1990s, before the internet even existed. Cyber security wasn’t thought of or built into the development process of these systems. The number of vulnerabilities in millions of lines of code is literally unknown and all that can be done is create patch updates as they are found. Criminals love exploiting these vulnerabilities, so the longer that out-dated system remains in your organization, the easier it will be for them.

Don’t Keep Your Devices and Systems Updated

I dont want to wait to configure Windows Updates - Coub - The Biggest Video  Meme Platform

Blame it on the fact that you don’t have time to install all the updates for Windows, Adobe, Chrome, Firefox, 7zip… etc etc.  If by some chance you do have time, don’t create a process around it. And by golly, definitely don’t outsource all this to someone who can automate it

Don’t Implement Zero Trust

Zero Trust No One GIF - Zero Trust No One - Discover & Share GIFs

It’s just the latest fad right? What’s the worst that could happen if someone gets into your network in one area, and are automatically given free reign into other areas of your network? We can’t think of anything.

Allow your users to visit infected websites

How to remove Your Windows 10 Is Infected With 5 Viruses! POP-UP Scam -  virus removal guide (updated)

Train your users all you want, there’s still some sophisticated campaigns out there which appear very legitimate to most users. But don’t implement filtering systems that can block infected websites. That would make too much sense right? Shouldn’t we trust our users not to ever go to a compromised site???

Conclusion

If anything we’ve listed above is keeping you awake at night, please do get in contact with us. We’d love to help you sleep!