There is one rule of thumb when considering hackers – if there is something to get around, they will find a way to get the data that they want. For instance, when music piracy was at its height, record companies decided to start adding a copy protection measure to CDs so that they couldn’t be reproduced at home. Within days, a hacker had figured out that outlining the edge of the disc with a Sharpie, any CD-rom drive would skip the protection on the rim of the disc.
The point I’m trying to make is no matter how secure a computer system is, hackers will always find a way to raid and exploit any cracks in any system. Just recently, hackers have raided the personal accounts of iTunes users to make fraudulent purchases, according to Computing News:
“Cyber criminals are able to crack the accounts by using brute force attacks, where an automated system tries thousands of popular passwords with each account name. Many people use the same passwords for their social media accounts, which are easily compromised, and the information can be used to hack other services including iTunes.”
The article says that the security firm publishing its findings about iTunes says that there are numerous holes in the program’s makeup that consistently lead to this type of activity. If you own a business, make sure that your employees are trained to recognize suspicious activity on their systems. A program like iTunes, which is a popular and well-respected music program, will most likely be on employee systems. How can you protect from any potential security lapses in a program like that?
Hire an independent network security company to take an in-depth look at your data server systems. A security audit and penetration test (both internal and external) will show you where there are any possible holes in your network and how to deal with them.