How to Beat Cybercriminals at Their Own Game, Part I

How to Beat Cybercriminals at Their Own Game, Part I by Justin Spittler – Casey Research

Justin’s note: Over the next two days, I’m sharing a special interview that features Doug Casey and his colleagues on the latest crime wave that’s sweeping the globe.

Below, you’ll hear from John Hunt, an MD and coauthor with Doug of Speculator and Drug Lord, and Durk Pearson, bestselling author and former rocket scientist and aerospace physicist. They recently sat down with Doug to share their best tips on how to protect yourself against the growing cyber-threat.

I think you’ll find their ideas interesting and timely…

John: Equifax hacks, Russian hacks, and political hacks are all competing with the Kardashians for primetime news reports. Let’s focus on something that might actually matter to each of us and that we can do something about: our own personal cybersecurity.

Durk: Computer security is a lot more important than most people realize. Absent precautions, it’s like if you had a stack of $100 bills and left it on the sidewalk in front of your house. If someone happens to stroll through your neighborhood, he can just pick them up.

Likewise, most people have no computer defenses at all. You have more than $100 bills in that computer. You have your future money too, and your credit.

But you can become resistant to this. It’s not an impossible task. Remember the old story? You don’t have to run faster than the bear. You just have to run faster than the other guy. And that is surprisingly simple.

John: So what do you advise that everyone should do now?

Durk: First know that if you live in a gated residential community, you have a very low chance of being robbed. But the internet is as if everyone lives in Watts in the 1960s, or South Chicago now.

John: You have to build your gates and walls.

Durk: Right. Now, you don’t have to be a perfectly hard target. There is no such thing as a perfectly hard target. The CIA got hacked for a lot of their extremely dangerous hacking tools which are now out in the public domain. If the CIA can get hacked, believe me you can get hacked too.

On the other hand, all you have to do is make yourself a much harder target than the value of what people can get out of you and you’re going to be left alone. They’re going to move on to somebody else who isn’t as tough. Which is most everybody.

Continue Reading / Casey Research>>>

Sharing is caring!