Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpgIn 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

Vigilantism is a frowned-upon and dangerous practice. Even though it’s been immortalized and glorified by various superheroes, like Batman and the Green Arrow, it’s a slap in the face to the laws that govern the land. However, there are situations where it takes criminals to defeat criminals. Hackers who use their skills to take down other criminals might seem admirable, but it’s important to consider why society may benefit from their actions.

Authorities are having a hard time protecting people from the surge of questionable online activity, and the fact that the world has let the Internet become a place where the message of hatred, bigotry, and fear-mongering can reach the world’s population in unprecedented ways. On the other hand, whether or not the actions of hacktivists like Anonymous are right is up for debate. While they might not be attacking users for the sake of attacking them, they’re still performing illegal activity. This fact can’t be ignored. However, if their cyber attacks on terrorist groups and other dangerous entities can help to make the world a safer, less hate-filled place, we think that’s something that even the authorities can agree with.

Whether or not your business is the target of vigilante hacking groups like Anonymous might not be apparent, but we can assure you that there are plenty of bad hackers out there who would do anything to get ahold of your business’s private and sensitive information. Regardless of what type of hacker is targeting you, you need to be prepared with a Unified Threat Management (UTM) solution designed to keep your business safe from all manners of threats. A UTM is a comprehensive security tool that combines enterprise-level firewalls and antivirus solutions with preventative measures, like spam-blocking and content-filtering solutions. The goal of a UTM is to limit your organization’s exposure to online threats as much as possible, reducing your chances of being targeted.

It should be mentioned, though, that no solution is perfect. Just like the world will always contain cruel and unusual entities, the Internet will spawn some vile threat that may one day seep between the cracks of your defenses. When that time comes, at least you’ll be ready.

What are your thoughts on the increased hacktivist activity? Do you think that what they’re doing is right, or should they be punished for breaking the law? Let us know in the comments. If you’d like any more information about UTMs and other security solutions, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 May 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Computer Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Ransomware Hardware Disaster Recovery Communication Hacking WiFi Operating System Facebook The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Managed Service Provider Outlook Employer-Employee Relationship History Wireless Technology Two-factor Authentication Android Small Business Phishing Apple App Mobile Computing Best Practice Big Data communications Alert Safety Unified Threat Management Networking Data storage Quick Tips Data Windows Experience Firewall Smartphones Content Filtering Cybercrime Mobile Device Management Money Network Website Society Sports Presentation Managed IT services Entrepreneur Google Wallet Spam Domains Running Cable Information Technology Windows 8 Internet of Things Hacker Bluetooth Hosted Solution Windows XP IT Services Documents Application Automation Artificial Intelligence Tech Support Compliance Customer Service Memory Drones Deep Learning Social Printer Browser BDR Router Virtual Desktop Wireless Office 365 Securty Vendor Management Unified Communications Document Management Saving Money Encryption Analytics Law Enforcement intranet SaaS VoIP Lithium-ion battery Monitors Proactive IT Cortana Network Congestion Social Networking Public Speaking Displays Save Money Music IP Address Virtualization Laptop End of Support Government Cryptocurrency IBM Augmented Reality Keyboard User Google Docs Education Search Holiday Hard Drives Writing Cleaning Black Market YouTube Processors Remote Computing Shortcut DDoS Office Tips LiFi Staffing Downtime Heating/Cooling Word BYOD Passwords Streaming Media Help Desk Micrsooft Visible Light Communication Disaster Retail Business Management Business Growth Data Management Recovery Competition Robot Advertising
QR-Code