Why Do Hackers Want My Data?
Home 9 Data Security 9 Why Do Hackers Want My Data?

By: David R. Herman – Director, Technical Services

Hacking has become so commonplace that many people have begun disregarding the potentially disastrous consequences of it. Why do hackers hack, anyway? Why are we burdened with the inconvenience and expense of firewalls, anti-virus programs, content filters, and having to sort through pages of spam selling you the next super vitamin.

As in many other facets of life – follow the money! While it’s true there are some hacking groups that use hacking as a canvas for their social messaging, bragging rights, corporate espionage and other reasons, the vast majority of ‘professional’ hacking is for personal and financial enrichment.

This article aims to help you understand what a serious effort is being made to steal and make money using YOUR data. Now is the time to ensure you are putting enough resources toward protecting your data (as opposed to glazing over and rolling your eyes every time your IT professional starts warning you about ‘those vile hackers’).

So how do hackers make money from your data? By selling it, of course!
Here are some of the most common ways hackers are profiting from your data right now:

  • Ransomware. Hackers encrypt the data on your computer or network so you cannot access it, essentially holding it ransom. Then they offer to ‘sell it back to you’ for a fee. Once you pay, they usually give you the key needed to decrypt it.
    – Motive: Financial gain through the direct sale of data back to its owner.
  • Stolen Financial Data. Credit cards, social security numbers and other identifying information can be used for immediate identity theft exploits. Hackers collect this information and then sell it on the deep web to groups skilled at using it to perpetrate identity theft. It is its own business and it’s happening 24 hours a day, 7 days a week.
    – Motive: Financial gain via short-term identity theft.
  • Stolen Data. If you’ve been to a doctor in the past few years, you’re familiar with the term ‘HIPAA guidelines.’ For providers, HIPAA causes numerous headaches as it forces practices to create special procedures, train their staff, and even invest in specialized software. As a patient, HIPAA provides you with data privacy and security provisions meant to safeguard your medical information. As medicine moves toward electronic medical records, it opens the door to medical data fraud. When a hacker obtains your medical data they can submit fraudulent claims, resulting in insurance and Medicare fraud, costing the industry billions of dollars each year ($6.2 billion according to a recent IBM/Ponemon report). Furthermore, since medical records contain personal data that is biometric and never changes, skilled groups can re-use this data for future identity theft exploits long after the data is obtained.While the example above is specific to the healthcare industry, it’s important to note that any industry with sensitive data about its clients is at risk, including the accounting, legal and financial industries.
    – Motive: Financial gain via short-term and long-term identity theft and insurance fraud.

These are just three of the more popular exploits we see every day. Unfortunately, there are many more, and they are ever-evolving. So, the next time you see a bright red and yellow pop-up warning stating ‘Your computer is vulnerable,’ don’t ignore it. There are full-time hackers working hard to get at your data.

Want to stay ahead of the hackers and keep your data secure? Give us a call to assess your vulnerability and secure your data.

Recent Posts

Custom Solution Drastically Improves Workflow for Spinal Group

The Client and Their Challenge A fast-paced, specialized spinal surgery practice with more than 18 locations throughout New Jersey, New York and Florida, had a critical need to access patient images 24 hours a day, 7 days a week, 365 days a year. Their inability to do...

How ACT Helped a Large Orthopedic Group In New Jersey

We were contacted by the Practice Administrator of a large Orthopedic group in Central New Jersey. An industry expert referred us to her because the practice was using a PACS system at one of their sites and it was slowing their network down dramatically. The...

5 Benefits of Cloud Computing

Cloud computing has been around for decades, but change can be scary for many business owners. An International Data Group study says 69% of businesses already use Cloud technology in some capacity, and 18% say they plan to implement Cloud computing solutions in the...

What We Do

Managed IT Services

Learn More

Cloud Computing

Learn More

Backup & Disaster Recovery

Learn More

Network Services & Support

Learn More

Security Solutions

Learn More

Co-Managed IT

Learn More

Improve and grow your business with a smarter IT solution.