The Hacking Test

There’s no denying it – the Internet is the new (almost) lawless state, where thieves and con artists are perfecting new skills in scamming, cheating and lying. Large companies appear to be experiencing more and more breaches as hackers look for ways to steal information, gain financially or just get their kicks. Information technology (IT) is a double-edged sword: convenient for companies and convenient for those looking to cause those companies damage.

We often hear of large firms being hacked and sensitive information being compromised. Recently The New York Times admitted that they had been victims of international hacking. Just this week Evernote was infiltrated, and not long ago Twitter again announced that users’ details may have been stolen. Even Apple is no longer immune. And these cases are just the ones we hear about. So, as a company, how do you avoid becoming a victim of hacking?


1. Start with an IT audit

Performed by an IT audit specialist, this helps you to identify weaknesses within your IT environment, determine whether the right controls are in place, and if systems are operating effectively.


2. Test your systems

An ethical hacker can be employed to try and compromise your IT structures, thereby exposing any weaknesses that may need addressing, as well as advising of possible solutions.


3. Be a difficult target

Make things harder for hackers by using non-corporate systems (ie. Google). Avoid removing pre-set limitations on your portable devices (jailbreaking), as this disables certain security functions. If possible, use apps on your portable devices rather than browsing on your PC. And never check your emails from public computers.


Unfortunately no system is completely secure. But by remaining vigilant and adhering to strict controls, you are able to minimalise any security threats.


Have you ever been a victim of hacking? Tell us about your experience below.