Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpgIn 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

Vigilantism is a frowned-upon and dangerous practice. Even though it’s been immortalized and glorified by various superheroes, like Batman and the Green Arrow, it’s a slap in the face to the laws that govern the land. However, there are situations where it takes criminals to defeat criminals. Hackers who use their skills to take down other criminals might seem admirable, but it’s important to consider why society may benefit from their actions.

Authorities are having a hard time protecting people from the surge of questionable online activity, and the fact that the world has let the Internet become a place where the message of hatred, bigotry, and fear-mongering can reach the world’s population in unprecedented ways. On the other hand, whether or not the actions of hacktivists like Anonymous are right is up for debate. While they might not be attacking users for the sake of attacking them, they’re still performing illegal activity. This fact can’t be ignored. However, if their cyber attacks on terrorist groups and other dangerous entities can help to make the world a safer, less hate-filled place, we think that’s something that even the authorities can agree with.

Whether or not your business is the target of vigilante hacking groups like Anonymous might not be apparent, but we can assure you that there are plenty of bad hackers out there who would do anything to get ahold of your business’s private and sensitive information. Regardless of what type of hacker is targeting you, you need to be prepared with a Unified Threat Management (UTM) solution designed to keep your business safe from all manners of threats. A UTM is a comprehensive security tool that combines enterprise-level firewalls and antivirus solutions with preventative measures, like spam-blocking and content-filtering solutions. The goal of a UTM is to limit your organization’s exposure to online threats as much as possible, reducing your chances of being targeted.

It should be mentioned, though, that no solution is perfect. Just like the world will always contain cruel and unusual entities, the Internet will spawn some vile threat that may one day seep between the cracks of your defenses. When that time comes, at least you’ll be ready.

What are your thoughts on the increased hacktivist activity? Do you think that what they’re doing is right, or should they be punished for breaking the law? Let us know in the comments. If you’d like any more information about UTMs and other security solutions, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware Business Continuity The Internet of Things Social Media Disaster Recovery Communication Hacking Bandwidth WiFi Facebook Microsoft Office Office Operating System Backup Apps Website Best Practice Alert Networking Employer-Employee Relationship Data storage History Data Windows Two-factor Authentication Experience Small Business Phishing App Mobile Computing Mobile Device Management Money Big Data communications Safety Smartphones Network Unified Threat Management Quick Tips Managed Service Provider Outlook Firewall Wireless Technology Android Content Filtering Apple Cybercrime Document Management Encryption Deep Learning Competition Law Enforcement SaaS BDR VoIP Presentation Entrepreneur Proactive IT Domains Vendor Management Cortana Network Congestion Hacker Save Money Music Monitors Application Cryptocurrency Laptop Customer Service Displays IBM Google Docs Education Cleaning Holiday Router Black Market YouTube Office 365 End of Support Processors Staffing Office Tips LiFi BYOD Downtime Analytics Saving Money intranet Passwords Streaming Media Lithium-ion battery Writing Help Desk Disaster Micrsooft Visible Light Communication Social Networking Business Growth Data Management Recovery Public Speaking Robot Advertising Society Sports IP Address Virtualization Google Wallet Spam Retail Running Cable Government Information Technology Windows 8 Internet of Things Augmented Reality Keyboard User Hosted Solution Windows XP Search Managed IT services IT Services Documents Hard Drives Artificial Intelligence Tech Support Compliance Remote Computing Shortcut Drones DDoS Bluetooth Heating/Cooling Word Social Printer Browser Automation Virtual Desktop Memory Wireless Securty Business Management Unified Communications
QR-Code