A small sample of what hackers and do and what you can do to prevent this from happening. 

Risks of Technology

The risks to privacy from collecting and storing personal information

Identity theft occurs when hackers exploit your personal or business information for their own benefit. They might use your federal tax ID to get loans or make unauthorized purchases, or even manipulate children's identities for gain. This can have serious consequences, with 1 in 10 children being affected. Additionally, hackers may alter medical records or file false tax returns to receive refunds. It's crucial to understand the risks and take steps to protect against identity theft.

Hackers can earn money by holding your data hostage and demanding a high ransom. They might even negotiate with you, but they could also entertain offers from others, making it hard for you to refuse paying. This makes it easy for hackers to profit, as victims often feel pressured to pay up. However, you can spot this if your device is aggressively attacked by ransomware, which locks you out of your files, leading to a hostage situation for your data.

Data traders sell your information to advertisers, who then use it to make personalized ads based on your online activities like shopping lists and search history. This makes it enticing for you to spend money, even though no money is actually taken from you. It's a sneaky tactic used by marketers, selling your data to stores that can profit from your interests. For instance, if you often search for plant-related topics, you'll likely see ads related to plants.

How can computing resources be misused and how can it be protected?

It's important to provide employees with access to technology for efficient communication, but technology also brings distractions like games, social media, videos, and shopping. Misuse of computing resources can occur through unauthorized downloading, file sharing, or personal web surfing. In schools, social media and games are common distractions, with students sometimes ignoring lessons to use their phones. However, distractions can affect people of all ages and in various settings.

First, define misuse, as some activities like watching TV while using personal WiFi might seem harmless. Establish clear policies outlining proper use of company technology, including internet, email, computers, and printers. Ensure employees understand these policies and the consequences of violating them. Gather feedback to adjust policies to fit your company's needs. Limit the time employees spend on certain applications during work hours. Monitor technology use to address issues before they escalate. Discuss consequences for policy violations, which may involve reporting unethical behavior to authorities. Provide approved apps and tools to prevent employees from searching for alternatives. Allow breaks for personal reasons to prevent misuse and promote clarity.

How unauthorized access to information is gained?

People may manually guess passwords by trying to find personal information that could be used as a password. In larger attacks, software is used to guess usernames, passwords, and PINs. Additionally, software can exploit bugs to steal information. It's important to be cautious with items that might contain bugs, as they could be used for malicious purposes.



Some individuals use ordinary items to enter secure areas, blending in as if they belong. Lost, stolen, or duplicated ID cards can lead to unauthorized access. Another method is simply leaving a door or window open, granting entry to restricted areas. Reasons for stealing information include obtaining sensitive data, causing harm, holding data for ransom, or playing pranks.



People collaborate illegally to access unauthorized areas or digital systems. Insiders typically devise a plan, while outsiders carry it out. Sophisticated parties can bypass internal controls and security measures, often in competitive business environments. They may obtain customer information from third parties to gain an advantage. Price fixing is a common form of collusion, where companies manipulate prices to benefit themselves, potentially harming smaller competitors. This practice reduces competition and creates obstacles for new businesses.