The extreme ways people protect themselves from hacks

When Dave Weinstein worked in a government job a few years back, he took an extreme measure to keep his data secure from hackers. He and his co-workers physi...

Posted: Nov 28, 2018 10:54 AM

When Dave Weinstein worked in a government job a few years back, he took an extreme measure to keep his data secure from hackers. He and his co-workers physically removed the hard drives from their computers and locked them up in a safe at the end of the day.

While that level of security isn't always necessary, the possibility of having your credit card stolen or misued, suffering from identity theft or getting hacked is on the rise. And people like Weinstein are finding creative ways to protect their passwords and devices.

Facebook CEO Mark Zuckerberg famously covers up his laptop's webcam with a sticker, a practice that is increasingly common, and most people now know not to use the same password for all their accounts. Some security experts are taking personal protection even further.

Now the vice president of threat research at Claroty, an industrial cybersecurity company, Weinstein uses at least two different identity-theft protection subscriptions, such as Experian, Equifax or Lifelock, to ensure that his information isn't being compromised or sold online.

These services monitor financial data such as credit card information, loan applications and bank accounts to ensure that information isn't being compromised or sold online.

Weinstein's security practices are far from rare. Wendy Nather, director of advisory chief information security officers at Duo Security, has a clever trick to thwart would-be hacks.

"I use a different credit card to make automated [bill] payments online than I do for purchases on the street," Nather said.

Nather keeps things separate so that if her everyday credit card is breached, she doesn't have to change the card for each of her automated payments. It also minimizes the potential damage a hacker can do because it's not tied to any important online accounts.

Others focus on compartmentalizing areas of their lives such as using different physical computers for work and personal use, or create separate digital accounts for working, shopping and banking.

Nather said she's even known people who will only do certain tasks on paper and keep it locked in a safe.

Kevin Kosh, a partner at CHEN PR which represents tech companies, uses a Google voice number -- not his mobile number -- to receive two-factor authentication texts. Two-factor authentication requires using a one-time code to access accounts, in addition to a password.

His logic is that if you ever change your SIM card — like when you get a new phone or change carriers — there's no connection to your sensitive information.

Nather and Weinstein are also big advocates of keeping mobile software up to date for bug fixes and security patches.

Weinstein said he's known some people who completely eliminate email due to the high risk of phishing and malware.

Although that's not a reasonable fix for most people, he noted one area in which people could adopt a more cautious approach is with home routers.

"Most people get them through their internet service provider and they don't necessarily prioritize security," Weinstein said. "Consider purchasing a home router as you would any other technology that you care about. It's more than just giving you wireless access. Security needs to be part of the equation."

These routers are easily hacked and can provide access to sensitive information because most people feel safe using computers on a protected network.

But Weinstein cautioned against taking every extreme security precaution, such as using personal servers for email.

"It's the thing people do to be secure and then it ends up backfiring," he said. "Unless you have a state-of-the-art facility and 24/7 operation center backing it, you can't compare the level of security to something as commoditized as Gmail."

Nather agrees, noting "if you're sufficiently paranoid, you can never prove to yourself that you're safe."

She said there are some things that should be done off the bat, such as 2-factor authentication and loading passwords into a password manager. But "unless you know you're at high-risk of being targeted, say a government official or high-placed executive, you're probably not going to be."

Indiana Coronavirus Cases

Data is updated nightly.

Cases: 1011197

Reported Deaths: 16524
CountyCasesDeaths
Marion1359292129
Lake666181167
Allen58254802
Hamilton46498467
St. Joseph44559617
Elkhart36044510
Vanderburgh32333481
Tippecanoe28037260
Johnson25196446
Hendricks23960360
Porter22985367
Madison18820410
Clark18609253
Vigo17530303
Monroe15319200
LaPorte15230252
Delaware15127264
Howard14801290
Kosciusko12410149
Hancock11773176
Bartholomew11695180
Warrick11305189
Floyd11138215
Wayne11023253
Grant10131220
Morgan9506177
Boone8965116
Dubois8281131
Henry8252153
Dearborn823493
Noble8064106
Marshall7981135
Cass7556123
Lawrence7479172
Shelby7216119
Jackson700990
Gibson6614115
Harrison651892
Huntington6447100
Knox6427106
DeKalb6363100
Montgomery6293112
Miami595298
Putnam584179
Clinton579271
Whitley568455
Steuben566876
Wabash5363104
Jasper536180
Jefferson513297
Ripley501987
Adams483777
Daviess4684115
Scott439875
Greene427296
Clay426960
Wells426088
White420964
Decatur4177104
Fayette407387
Jennings390262
Posey377544
LaGrange361778
Washington360451
Randolph3476100
Spencer340743
Fountain336160
Sullivan330852
Starke319171
Owen315571
Fulton313468
Orange295064
Jay285546
Franklin266443
Perry265752
Rush263832
Carroll262434
Vermillion259854
Parke232029
Pike229643
Tipton229059
Blackford195042
Pulaski184657
Crawford160125
Newton159848
Benton151217
Brown147047
Martin139319
Switzerland135311
Warren121416
Union107216
Ohio84613
Unassigned0544

Ohio Coronavirus Cases

Data is updated nightly.

Cases: 1524169

Reported Deaths: 23955
CountyCasesDeaths
Franklin1646591696
Cuyahoga1468932459
Hamilton1056051431
Montgomery742551279
Summit620221111
Lucas56539917
Butler51696718
Stark468601064
Lorain35783585
Warren32903377
Mahoning30927693
Clermont28271330
Lake27179448
Delaware24263164
Licking24027294
Trumbull22993561
Fairfield22438247
Greene22414326
Medina22149313
Clark19920354
Richland18643292
Portage18073252
Wood17505224
Allen16054279
Miami15627306
Muskingum14890185
Columbiana14153274
Wayne13852271
Tuscarawas12777311
Marion12016180
Scioto11497162
Pickaway11386142
Erie10951184
Ross10614203
Ashtabula9809204
Lawrence9783153
Hancock9741155
Belmont9333209
Geauga9008157
Jefferson8600199
Huron8427143
Union822259
Washington8114144
Sandusky7875151
Athens779579
Knox7766144
Darke7695158
Seneca7405145
Ashland6993130
Auglaize681799
Shelby6540115
Brown640091
Crawford6292130
Defiance6241105
Mercer617893
Fulton605196
Highland602899
Guernsey596371
Madison595678
Logan594596
Clinton585193
Preble5730125
Putnam5354110
Williams530888
Perry519863
Champaign514273
Jackson512473
Ottawa490586
Coshocton488383
Morrow460558
Pike435067
Fayette430363
Hardin420780
Gallia419367
Adams417995
Van Wert374082
Henry366972
Holmes3653125
Hocking357582
Wyandot325262
Carroll304365
Paulding280747
Meigs267251
Monroe216254
Noble201247
Morgan194333
Harrison182646
Vinton167225
Unassigned05
Fort Wayne
Clear
49° wxIcon
Hi: 54° Lo: 42°
Feels Like: 47°
Angola
Clear
43° wxIcon
Hi: 52° Lo: 39°
Feels Like: 43°
Huntington
Clear
49° wxIcon
Hi: 55° Lo: 41°
Feels Like: 47°
Decatur
Clear
49° wxIcon
Hi: 55° Lo: 42°
Feels Like: 47°
Van Wert
Partly Cloudy
48° wxIcon
Hi: 54° Lo: 42°
Feels Like: 45°
After a frosty start to the day, temperatures warm into the middle 50s under a mixture of clouds and sun.
WFFT Radar
WFFT Temperatures
WFFT National

Community Events