A Professional Hacker Tells You How to Protect Your PC

If cyber creeps want in, they get in. Security expert Gregory D. Evans tells you ways to stay safe in cyberspace

Warning: getimagesize(): Filename cannot be empty in /home/blackenterprise/public_html/wp-content/themes/blackenterprise/single-standard.php on line 35

Every six seconds a personal computer is hacked into. Often times hacking victims don’t find out until it’s too late–leaving them vulnerable to identity theft, email intrusion, cyber stalking and a collection of other virtual crimes. And although the United States has penalties for cyber crimes, only one out of every 10,000 crimes that gets reported leads to an arrest or conviction.

BlackEnterprise.com wanted to know first-hand what it takes to keep your PC safe, so we went straight to the source–well-known computer security expert, Gregory D. Evans. We talked with the convicted-hacker-turned-founder of LIGATT Security International, one of the nation’s leading high-tech security companies, and Spoofem.com about key ways to curb cyber intrusion.

Think like a hacker. Evans suggests using AmIHackerProof.com. “This is like the ADT for your network,” he remarks. It will perform an in-depth scan like a hacker would for free, letting you know where your computer is vulnerable. However, if you are a subscriber it will scan your PC automatically five times a week and send you a detailed report afterwards.

Invest in encryption software. “You want to make sure the data on the computer is protected,” says the tech guru. The software takes data and encodes it so that no one can read it without first submitting the decryption key.  Evans suggests full disk encryption,which encrypts each byte of data stored on the hard disk, but there are several types to choose from.

Don’t use the same username and password for all of your accounts. Many websites compile a list of their users’ email addresses and passwords. Those hacking into a site’s system will then try the password submitted on the email address attached to the account. If you use the same password for several email addresses, the hacker–who now has access to one email account–can easily log in to your other mailboxes.

“We found that sixty percent of the people who have had their Facebook, Twitter pages and all these other systems hacked all use the exact same email address and password,” says Evans.

Limit sending mass emails, especially chain letters. The moment you send an email with all of your contacts, you have let the recipients know who is in your network. In the case of chain letters, often times you don’t know who started the letter so when you send it to numerous contacts, including the originator of the email, and they in turn forward it to all of their contacts you’re giving up numerous email addresses. The hacker can send out a spoof email, which makes an email appear like it’s from you or one of your contacts. It’s an easy way a hacker can install spyware on your computer.

There’s no such thing as too much protection. Although your computer comes with antivirus software, don’t feel limited. You can run more than one at the same time. Also, if you use a router make sure that its internal firewall is turned on. Same goes for the firewall on your computer. “There’s not one particular software program that can protect you from everything,” says Evans. By using different methods, you’ll have multiple layers of protection, he adds.

Shut your computer off in the evening. “If your computer’s off, no one can hack into it,” reminds Evans.

Related Content:

Stop Pop-Up Pests and Spyware

Obama on the Record: Cybersecurity

  • Terri Williams

    Very Informative.

  • This guy’s information really is kindergarten level – If you really want the truth on him, read this—> http://attrition.org/errata/charlatan/gregory_evans/

    • TTUSecPro

      Right on Jason. This is basic information and was a waste of time to read. Nothing about personal firewall protections, safe browsing practices (use of firefox with no-script!!!!) or even applying patches/updates!!! Turn your computer off as a control?!? That’s fine and all for when your away, but think about when you turn it back on with malware… That wont help too much now will it?

      After reading your link, it’s obvious this “security expert” guy is a fraud. I deal with info sec on a daily basis.. I also have a CISSP, CISA, and QSA.

      • Michelle Brown

        Then why haven’t we seen your expertise being featured anywhere? Impressive article Mr. Evans. I think people fail to realize that Mr. Evans speaks to non- security people. We understand the lingo better when he explains it, so applying patches/updates, malware, is to technical when you don’t understand security.

    • Kivin Miles

      You are the same guy that post this same thing about Evans all over the internet.  I researched Evans and his company and everywhere there is an article about Evans you are there telling people he is a fake and giving out this same link.

      On other boards you have called him nigger over 50 times.  That is right BE readers this man is not black but a white.  

      If this information was helpful then use it.  Don’t listen to Bill O’Relly  family members. 

  • Stella hall

    I believe this information was very helpful! I don’t like to see when people try to put black entrepreneurs down. Keep up the great work Mr.Evans!

  • Michelle Brown

    Yes Kivin, 

    I follow Mr. Evans and Jason is the probably the same Cyber Stalker that always harasses Mr. Evans. 

    It’s ashame an African American male cannot be an expert in an all white field without the white man bringing him down.

    After reviewing Mr. Evans website, people like this Jason character clearly are not stopping him from getting exposure, and probably never will. 

    Jason, what do you do? Do you just go around harassing black men who are better than you. 

    The African American community needs to take a stand against racist cyber stalkers. Keep doing your thing Mr. Evans because this is clearly about race than your expertise in cyber security.

  • Pingback: 8 Ways to Protect Your Smartphone from Viruses - BLACK ENTERPRISE()

  • Pingback: 8 Ways to Protect Your Smartphone from Viruses | AfroBuzz Central()

  • Mary

    This is really pre-school information. There is nothing here that hasn’t been published > 10 years ago. He is just trying to sell his website services that are free on the internet. Just because he says he is an expert doesn’t make him so. What are his professional certifications and qualifications? It doesn’t appear that he has any.

  • Pingback: Electronic Pickpocketing: How Safe is Your Identity? - BLACK ENTERPRISE()

  • Pingback: Electronic Pickpocketing: How Safe is Your Identity? | AfroBuzz Central()

  • Grace MacArthur

    OMG. I send mass emails all the time! Just sent one 15 minutes ago to my family. I hope we don’t get scammed. I’ve got to see if I’m hacker proof. 😮

    • Earl Dempsey

      It’s really simple. Go to AmIhackerproof.com. not only can you see if your computer has been hacked or laced with spyware, but you can also check other websites to see if they are safe to put your personal information into. It works. I won’t order ANYTHING online unless they stand up to the hacker proof test.

  • Charlie Parker

    So the fact that:

    – CBS News in Atlanta in February 2011 exposed this guy as a fraud
    “Cyber Security ‘Expert’ Is Felon, Accused Plagiarist, Uncertified Hacker”

    – His book contained over 90% plagarism, with entire chapters copied from other books

    – He claimed to have at least six certifications, such as CISSP and CISA, and he has none

    – Hackers took down his website, hacked his twitter and email account and posted all his emails and personal info all over the web

    – the major product he was selling (caller id spoofing) was made illegal.

    – He’s delinquent on the restitution payments from his criminal conviction

    Other than that, he’s a total trustworthy expert, and you should hire his firm to protect your computers.

  • Yungdaniel

    Funny how things come full circle.  The following link takes you to an email sent by Mr. Evans to his staff to discuss this very matter. http://pastebin.com/9m66wh2S

  • Pingback: 4 Ways to Protect Your Music from Digital Piracy - Black Enterprise()