Even the most successful people in tech can fall victim to hacking attempts on their online accounts.
This article shares how you can protect yourself and your business.
A LinkedIn password dump had allowed hackers access to Mark Zuckerberg’s account. A similar thing happened to Ev Williams, a co-founder of Twitter. Sundar Pichai, CEO of Google, and Brendan Iribe, CEO of Oculus, both had their accounts compromised.
Tesla and SpaceX CEO Elon Musk is one of the most cyber-aware tech entrepreneurs today. Elon reportedly has a peculiar habit of replacing his phone every 10-12 months. He also banned Zoom meetings in his company after reports surfaced about the software’s security issues.
Here are other security mistakes Elon Musk would need to make.
1. Not having a cybersecurity team.
In the 21st century, cyber security has emerged as one of the most pressing issues for companies worldwide. Once upon a time, a company’s security needs were limited to physical ones. But today, a company’s assets could be at risk from cybercriminals without a physical break-in.
Companies rely heavily on cybersecurity teams to help them stay ahead of cybercriminals. However, three of four SMBs claim they need more IT security staff.
Meanwhile, Elon Musk’s companies, Tesla and SpaceX, have aggressively hired IT security experts. Understandably, small companies might need more money for the best team, yet it’s one of the most essential investments that pay off.
2. Not taking end-to-end encryption seriously.
Elon Musk set the internet and privacy communities abuzz with a tweet that hinted he might increase encryption protections for Twitter DMs if he ever gained control of the company.
The business magnate’s use of an encrypted messaging app is also a testament to the significance of E2EE in his life and business. The importance of and the ability to use end-to-end encryption in messaging apps is widely known.
E2EE prevents access to the transferred data by third parties or unauthorized users, ensuring that it will not fall into the wrong hands. That type of encryption is crucial because it protects the information transmitted between sender and recipient. E2EE is also widely used in a secure cloud storage provider’s vocabulary.
3. Not knowing what to prioritize.
Musk knows the most significant threats to his business. In the case of Tesla, it’s a fleet-wide hack, so he places the most emphasis on safeguarding that area.
However, many businesses need to figure out what to prioritize. Should it be the cloud database, the internal network, or the marketing website?
Musk is aware he can’t possibly protect everything in his business. Even the wealthiest man in the world needs more time and money to ensure overall safety. Instead, you need to conduct a risk assessment to identify your most valuable assets and weigh their importance from both your and a hacker’s perspectives.
4. Not setting up MFA.
Cybercriminals steal credentials and use them to access networks without hacking. Authentication based on username and password alone no longer provides adequate protection. This is where MFA, or multi-factor authentication, comes into play. The NIS2 Directive recognizes the importance of strong authentication measures in improving cybersecurity across the EU.
MFA involves verifying a login attempt with additional protection layers, such as using codes sent via text messages, phone calls, or apps. Under the NIS2 Directive, organizations may need to implement robust authentication methods like MFA to meet the required cybersecurity standards.
Multiple-factor authentication is one of the most effective ways of reducing security risks. It is essential when using cloud services or connecting to internal business networks over the internet. The NIS2 Directive aims to enhance the overall cybersecurity posture of essential and important entities, which likely includes promoting the use of MFA.
Yet 55% of businesses have not implemented multi-factor authentication, according to a U.S.-based nonprofit Cyber Readiness Institute survey—only 28% of those who do require its use by staff members. This statistic highlights the importance of regulations like the NIS2 Directive in driving the adoption of stronger cybersecurity measures.
Musk has been vocal about how the company places a high value on cybersecurity alongside vehicle safety and security. Musk has advocated for Tesla to implement two-factor authentication for account safety. By 2020, Tesla owners could access the company’s two-factor authentication feature. When they log into their Tesla Account, they’ll see the option to enable two-factor authentication via a mobile app. Such proactive measures align with the spirit of the NIS2 Directive, which encourages organizations to implement strong cybersecurity practices.
Final words
In the realm of cyber security, it’s crucial to maintain a high level of vigilance. Instead of resorting to password reuse, it’s advisable to adopt a proactive approach similar to Elon Musk. This will help safeguard your data and sensitive information.