Search this Blog

How to Implement an Internet Security Counter Attack

Courtest of Wikimedia Commons
By Hector Cisneros

For more than a decade, hackers and cybercriminals have been increasingly wreaking havoc on business, government and the general public. Cybercrime has increased by a 100-fold in the last decade. Now it’s time to counterattack! But how, you ask? By what means do we have to counter this ever-growing menace? The fact is, we always could stop most hack attacks in their tracks. It’s just that people and businesses and governments try to implement what I call the least effort most gain strategy. This does not work! What does work is to implement the tools available and to then continuously upgrading your capability to stop all threats. Plus, there are new security measures available to make it much harder to breach your defenses. By implementing new and time-tested measures to thwart cybercriminals dead in their tracks, you can safeguard your digital domain.

What are these new and tried and true security measures? How can a business, government, or individual protect themselves from the increasing threats of cybercrime? In this episode of Working the Web to Win, we will explore new security measures that have just been released by Google and other companies to help counterattack the latest hacking threats being perpetrated by cyber criminals and rogue nations. We will also provide a detailed security plan that will stop most cyberattacks in their tracks. This will provide the reader with a list of potential threats and a means to further thwart hack attacks. So, get ready to print out this article and bolster your security as we delve into the latest in internet security methods to counterattack those who hack.

Courtesy of Army.mil
Cybersecurity 101 - Before I discuss the latest and greatest cybersecurity measures, I feel it’s important to mention the influence of having the proper security mindset. It’s not good enough to implement the best security measures if you aren’t acting prudently and securely. For example, clicking on offers that seem too good to be true is not acting securely. Visiting known security risk websites like, porn, warez and sites on the dark web are just asking for trouble. Sharing too much personal or business information on your social nets is another foolish mistake. No amount of hardware or software security can stop a cybercriminal from succeeding if you help them. Take the time to learn as much as you can. Ignorance is not bliss. If you click on a phishing email instead of vetting or deleting it, that mistake is on you. No security measure can protect unsecure behavior.

In earlier articles, I have discussed many useful measures that thwart most hack attacks. Today, most of the hacks occur because people are easily enticed to foolishly give up access to their systems by falling for the temptation of unrealistic offers. Too often people don’t vet their emails, websites, and texts. All too often people, of all ranks, while using social media, give up precious personal information that can compromise their security.


Stop the Bleeding - In contrast, maintaining a security mindset, implementing, maintaining and upgrading basic security measures can stem the tide of constant attacks. For example, upgrading to a 12-digit password is much harder to guess than an eight digit one. Changing your password every six months makes it even harder for cybercriminals to take advantage of you, even if they stole your information during the Equifax breach. Upgrading to a two-step authentication from just a username and password only, is another exponential leap in security. Often, I have written about using a multi-layered anti-malware defense because this is better than just having one program protecting you. Make sure you check out the more than two dozen articles we have written regarding cybersecurity. These articles provide cybersecurity principles, and good security principles don’t expire, you just keep adding more of them to your defense.

New Security Measures - Not long ago, Google upgraded its account sign-in & security consoles. They added a security and privacy checkup feature along with a means to monitor your user login activity on your accounts. In this console, you can set up two-step authentication where Google sends a code to your phone as
Courtesy of Wikimedia Commons
an additional security measure to use during logging in. Google recently announced that it was adding additional authentication measures for individuals who work in high-risk occupations.
These include politicians, other officials, high net-worth individuals, activists, dissidents, and journalists. Google’s new system implements the use of a hardware USB key that must be connected to the device for you to complete the log in process. A Bluetooth one is available for mobile devices. This is an exponential upgrade even over two-step authentication. This new authentication process isn’t vulnerable to phishing sites that spoof Google’s login page, even if the cybercriminal has your username and password.


Plugging the KRACK - Hacking hardware vulnerabilities have been around for a long time. Now a new security hole in all WIFI systems has been exposed. This new vulnerability, nicknamed KRACK,
Courtesy of Wikipedia
makes it possible for a hacker to intercept authentication handshakes and to capture the information in order to use it to gain access to your network. This is especially true of IoT devices like smart TVs and other IOT devices. If you're using WIFI, you are vulnerable. The good news is that WIFI can be updated and patched. Updated drivers are available for most network cards and Windows systems. The industry will be releasing updates for all WIFI systems. The bad news is that this will take time. So, what does this all mean? It means you must take a comprehensive approach to security. This means plugging the security holes where ever they appear. It’s a necessity to make sure that your hardware drivers are upgraded on a regular basis. I use a program called Driver Booster 5 to keep my hardware drivers up to date.

Adding More Security and Privacy -  Another very useful security measure is to increase privacy by using a VPN, (aka Virtual Private Network) to gain access to the web. Virtual Private Networks can provide additional encryption layers to your information and make it much harder for a cybercriminal to discover your IP address. This adds a greater level of security and privacy. An Article on the ezine, “Guiding Tech” by Yadon Chen, explains what it is and how it works. Along the same lines, make sure your websites, blogs and social networks are using HTTPS protocols. This will also make your sites more secure and private. It will also bolster consumer confidence and improve your ranking.

Courtesy of Flickr
Update Everything Now - Another simple security measure many individuals ignore is updating their browsers and their browser plugins. In fact, all software on your digital devices need to be kept up to date to provide the latest and most secure operating environment. Windows 10 does automate some of this process, but I also recommend adding Advanced System Care Ultimate which can scan for and correct, multiple types of digital system updates and maintenance. This application can provide scanning for software updates, malware threats, spyware removal, privacy sweeps, vulnerability fixes and much more.

Creating a Multi-layered Defense - Speaking of using Advanced System Care, we employ it as part of a multi-layered defense. We believe that no single anti-malware program can protect you from every kind of malware attack. So, we use multiple programs to protect our digital devices. And when I say digital devices I mean all of our devices, including computers, tablets, smartphones and any IoT devices that allow the installation of malware protection. This multi-layered approach only
Courtesy of WorkingtheWebtoWin.com

has a few drawbacks. First, you must buy all three applications to protect your systems. Second, you have to find anti-malware applications that will play nicely together. Third, having three applications running simultaneously slows the overall performance of your system, (although a good computer with lots of RAM will operate fine).We have been using Trend Micro, Malwarebytes and IObits Malware Fighter Pro for years. I now substitute Advanced System Care Ultimate for Malware Fighter Pro so that I only have three anti-malware apps running. The trick to running all three of these systems together is to install Trend Micro first, then Advanced System care or Malware Fighter and then Malwarebytes last. Finally, you must tell each program to ignore the other when they flag each other during security scans. It is also worth mentioning that you can also turn on Windows Defender as it will also play nice with these three anti-malware products.

I thought it would be appropriate if I provided a simple security checklist that anyone could follow, to upgrade their security measures. Here are my top seven checklist items for you to implement. Following it will make your digital life safer.

My Top Seven Cybersecurity Items Checklist

□ First, adopt a security mindset. Always assume you’re being attacked. Don’t engage in needless and inappropriate web surfing and don’t succumb to the temptation of offers that are too good to be true. Teach your kids appropriate Internet behavior as well. Purchase and monitor your family’s credit and bank info with an ID protection plan.

□ Second, install, implement and maintain a multi-layered malware security defense system. Make sure you keep them all up to date. Do this on all digital devices your family owns, even IoT devices if possible.

□ Third, update all hardware drivers, software application, browsers and plugins often. If possible set up an automated update system. Don’t forget to update your WIFI system.
Courtesy of Pixabay

□ Fourth, implement a 12-digit username and password that includes numbers, letters, and special characters. Do this on all devices, especially your smartphones and tablets.

□ Fifth, if you are a high-risk internet user, add a hardware protection key layer to your defense. People like politicians, other officials, high net-worth individuals, activists, dissidents, journalists and even cybersecurity experts should heed this advice.

□ Sixth, if you own a business, make sure you take advantage of a VPN for internet access and HTTPS protocols for your website and blogs. Having secure access and showing that your website is secure will help you keep your business safe.

□ Seventh, read and learn as much as you can. Cybersecurity is an ever-evolving process. You must stay abreast of current threats and evolving countermeasures. This arena changes rapidly and not committing to ongoing vigilance is a big mistake. Write your congressmen and ask our government officials to implement a committed program to deal with this threat along the lines of what they did to put a man on the moon.

The following is a short list of articles we have written on cybersecurity. You can find a lot more by entering cybersecurity in the search box on the upper right-hand side of our blog.

Article Worth reading


The last decade has ushered in the era of the hacker. This threat endangers our very way of life. It’s time for all digital users to take responsibility and to increase the security of all digital systems. We can greatly reduce any hacker’s capabilities by just implementing the above seven items. Most cybercrime is made possible because we are not performing our due diligence, implementing sound practices and not maintaining our security capability. By implementing just these seven items, you can cut cybercrime dramatically. Become part of the solution, not the problem. Implement these seven items and take back your cyberlife.

Get your FREE COPY today.
That’s my opinion; I look forward to reading yours.

In this article, I have discussed how cybercrime has become the number one threat we face as a society and how we can counterattack this threat by implementing new and proven security measures. I provided a security implementation checklist of seven items that can make a dramatic difference in the war against cybercrime. These seven items, if implemented will greatly curb a cybercriminal’s ability to hack anybody’s digital systems.

If you feel your business could use some help with its marketing, give us a call at 904-410-2091. You can also fill out the form in the sidebar of this blog. It will allow us to provide you with a free marketing analysis to help you get better online results. Our claim to fame is that we are one of a few companies who actually provide ironclad guarantees.



Hector Cisneros is COO and Director of Social Media Marketing at Working the Web to Win, an award-winning Internet marketing company based in Jacksonville, Florida.  He is also co-host of the weekly Internet radio show, "Working the Web to Win" on BlogTalkRadio.com, which airs every Tuesday at 4 p.m. Eastern. Hector is a syndicated writer and published author of “60 Seconds to Success.” 

4 comments:

  1. Great post Hector. I have shared it on my facebook page.

    ReplyDelete
  2. Thanks Glenn, I really appreciate that coming from you.

    ReplyDelete
  3. Thank you for the great post. I like a way you describing the content. The points you raised are valid and suitable. I am an SEO Expert Telling you about trend micro support. trend micro support service helps you get set up, virus resolve. Let's talk to our experts to take payroll off your hands.

    ReplyDelete
  4. hi,
    I am . am Tech support Expert I found this information important I would like to get similar information further.

    ReplyDelete