Why Do Hackers Want My Data?
Home 9 Cybersecurity 9 Why Do Hackers Want My Data?

By: David R. Herman – Director, Technical Services

Hacking has become so commonplace that many people have begun disregarding the potentially disastrous consequences of it. Why do hackers hack, anyway? Why are we burdened with the inconvenience and expense of firewalls, anti-virus programs, content filters, and having to sort through pages of spam selling you the next super vitamin.

As in many other facets of life – follow the money! While it’s true there are some hacking groups that use hacking as a canvas for their social messaging, bragging rights, corporate espionage and other reasons, the vast majority of ‘professional’ hacking is for personal and financial enrichment.

This article aims to help you understand what a serious effort is being made to steal and make money using YOUR data. Now is the time to ensure you are putting enough resources toward protecting your data (as opposed to glazing over and rolling your eyes every time your IT professional starts warning you about ‘those vile hackers’).

So how do hackers make money from your data? By selling it, of course!
Here are some of the most common ways hackers are profiting from your data right now:

  • Ransomware. Hackers encrypt the data on your computer or network so you cannot access it, essentially holding it ransom. Then they offer to ‘sell it back to you’ for a fee. Once you pay, they usually give you the key needed to decrypt it.
    – Motive: Financial gain through the direct sale of data back to its owner.
  • Stolen Financial Data. Credit cards, social security numbers and other identifying information can be used for immediate identity theft exploits. Hackers collect this information and then sell it on the deep web to groups skilled at using it to perpetrate identity theft. It is its own business and it’s happening 24 hours a day, 7 days a week.
    – Motive: Financial gain via short-term identity theft.
  • Stolen Data. If you’ve been to a doctor in the past few years, you’re familiar with the term ‘HIPAA guidelines.’ For providers, HIPAA causes numerous headaches as it forces practices to create special procedures, train their staff, and even invest in specialized software. As a patient, HIPAA provides you with data privacy and security provisions meant to safeguard your medical information. As medicine moves toward electronic medical records, it opens the door to medical data fraud. When a hacker obtains your medical data they can submit fraudulent claims, resulting in insurance and Medicare fraud, costing the industry billions of dollars each year ($6.2 billion according to a recent IBM/Ponemon report). Furthermore, since medical records contain personal data that is biometric and never changes, skilled groups can re-use this data for future identity theft exploits long after the data is obtained.While the example above is specific to the healthcare industry, it’s important to note that any industry with sensitive data about its clients is at risk, including the accounting, legal and financial industries.
    – Motive: Financial gain via short-term and long-term identity theft and insurance fraud.

These are just three of the more popular exploits we see every day. Unfortunately, there are many more, and they are ever-evolving. So, the next time you see a bright red and yellow pop-up warning stating ‘Your computer is vulnerable,’ don’t ignore it. There are full-time hackers working hard to get at your data.

Want to stay ahead of the hackers and keep your data secure? Give us a call to assess your vulnerability and secure your data.

Recent Posts

Make Tax Season A Little Less Miserable

Ah, February – love is in the air and Cupid may just have his arrow pointed toward you and a special someone. But Cupid has competition. It's also tax season and scammers are out looking for their special someone(s), too. As if taxes weren’t horrible enough on their...

From Graveyard Dog to Company Mascot: Frida’s Rescue Story

At ACT, we've always believed in rooting for the underdog — because every great journey starts with humble beginnings. Just like how we started small, with a determined college student working out of a tiny coat closet, we know that resilience is the key to amazing...

Is AI Ruining the Holidays?

Coca-Cola has been running Christmas advertisements since the 1920s, with many even crediting the brand for shaping the modern image of Santa Claus. This transformation is largely attributed to Coca-Cola’s partnership in the 1930s with illustrator Haddon Sundblom....

20 Questions to Ask Before Choosing an IT Provider for Your Business

Choosing the right IT provider is a critical decision that can significantly impact your business's productivity, security, and growth. With technology playing an increasingly central role in day-to-day operations, you must ensure that the IT partner you select aligns...

Debunking 6 Myths About Managed Service Providers

In today's digital age, Managed Service Providers (MSPs) have become invaluable partners for businesses of all sizes. However, common misconceptions about MSPs often prevent organizations from reaping these benefits. In this article, we'll debunk some top myths...

What We Do

Managed IT Services

Learn More

Cloud Computing

Learn More

Backup & Disaster Recovery

Learn More

Network Services & Support

Learn More

Security Solutions

Learn More

Co-Managed IT

Learn More

Improve and grow your business with a smarter IT solution.