DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 9 Hacker Profiles You Need to Be Aware Of

Tip of the Week: 9 Hacker Profiles You Need to Be Aware Of

“Hacker” is a word that can bring up many powerful impressions in people. It may very well bring up images of a pale super genius hunched over a keyboard, awash in dim blue light, as it does for many people. However, this extremely specific image does little but pigeonhole the many hackers in the real world into this dramatized caricature.

In reality, there are many different kinds of hacker, each with a preferred target and reason for doing what they do. For your part, it helps to be familiar with the 10 types of hackers that are to be found in reality.


  • Script Kiddies: There’s a reason that this type of hacker is under the “amateur” heading. These are the hackers who are capable of little more than piggybacking onto larger efforts, or dabbling in the more basic forms of cybercrime. They are little more than nuisances, compared to their hacking compatriots.

The Good Guys

  • White Hats: These ethical hackers, usually security researchers, are those that help the average user by using their skills to keep threats at bay.

Political Players

  • Hacktivists: Using DDoS attacks and website vandalism to humiliate and hobble their targets, these actors are usually part of a larger group, working towards an ideologically driven common cause.
  • Nationalist Hackers: These actors are those that, thanks to their sympathies and patriotic motives, are often given a pass by law enforcement.
  • Nation State Agents: These actors typically  for a government body, usually in a military or intelligence capacity. They have access to great capital resources, but will not hesitate to use common tools as well.

The Criminals

  • Cyber Mercenaries: These are hackers-for-hire, who will be brought on to assist other cybercriminals for a share of whatever ill-gotten gains there are to be had.
  • Repeat Offenders: These hackers are skilled, yet disorganized, which keeps them from obtaining the profits that other varieties of hackers do.
  • Organized Crime: These are criminal organizations that focus on cybercrime, with a hierarchy that allows them to reap great profits from their schemes.
  • Malicious Insider: These are the criminals who sit inside your walls, actively working to sabotage your efforts and leak critical information to your competition, often for personal motivations.

These malicious insiders are easily the most dangerous threat to an SMB, but that doesn’t mean that the others don’t cause problems as well. In order to keep them all at bay, you will not only need to encourage diligence in the workplace, but also protect that workplace with comprehensive security solutions.

The experts at DatCom are ready to assist you in securing your business assets against external influences. Call 903-842-2220 to get started.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Hackers Microsoft Malware Tech Term Internet Productivity Software Backup Hardware Workplace Tips Business Email Innovation Mobile Devices Data Data Backup Smartphones Communications Android VoIP Business Continuity Cloud Computing Data Recovery Small Business Smartphone IT Services Efficiency Managed IT Services Windows 10 Disaster Recovery Ransomware Network Cybersecurity Router Computer Communication Outsourced IT Law Enforcement Cybercrime Windows Windows 10 Artificial Intelligence Server Browser Business Management Internet of Things Alert Chrome IT Support Computers Password Miscellaneous How To Applications Mobile Device Office 365 Gadgets Money Collaboration BDR Spam Saving Money Social Media Managed IT Services Wi-Fi Telephone Systems Quick Tips Productivity Facebook Information Passwords Phishing Virtualization Word Holiday Operating System Data Protection Government App Mobility Vulnerability Social Engineering Avoiding Downtime Settings Mobile Device Management Health Work/Life Balance Keyboard Encryption Paperless Office Office Microsoft Office Private Cloud Save Money Connectivity BYOD Voice over Internet Protocol Managed Service Data Security Flexibility Apps Two-factor Authentication Telephone System Telephony Unsupported Software Windows 7 CES Data Breach Software as a Service Sports Data Management Data Storage Content Management Legal Bandwidth Augmented Reality Automation Meetings Google Docs Net Neutrality OneNote Cryptocurrency Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Google Drive Human Resources Spam Blocking End of Support VPN Upgrade Machine Learning Virtual Assistant Office Tips Remote Computing Public Cloud IT Plan Business Intelligence Fraud Access Control Managed IT Bring Your Own Device Botnet Update Google Search FENG Scalability Cortana Hiring/Firing Wire Users Mouse Hybrid Cloud Conferencing Battery Millennials Password Management Security Cameras Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Telecommuting File Sharing Search WiFi Gmail Company Culture Outlook Workforce Digital Signature Firewall Proactive IT Skype Content Biometric Security Travel Google Apps Risk Management Administrator Information Technology Emails Software Tips Education NIST Hacker Solid State Drive Flash Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology Frequently Asked Questions Document Management Remote Work Practices Patch Management How to Recycling Training Managing Stress Shortcuts PDF ISP Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure Smartwatch Audit Video Games Online Shopping Smart Tech Current Events Addiction Advertising USB Samsung Excel Best Practice Save Time Hosted Computing Remote Worker Internet Exlporer Recovery eWaste Social FCC Big Data Apple Cryptomining Tools Instant Messaging Search Engine Physical Security History Value Safe Mode Employee Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications Vendor Tip of the week Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Virtual Reality Title II iPhone Database Techology Downtime Password Manager HIPAA Marketing Bing Netflix Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Enterprise Content Management Display Windows 10s Windows Server 2008 Hacking Supercomputer Devices Unified Threat Management Internet exploMicrosoft Network Congestion Screen Mirroring Cleaning Worker Commute Online Accountants MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk Wireless HBO Hosted Solution SaaS Smart Technology Business Owner Emergency Rootkit Compliance Employer Employee Relationship Two Factor Authentication Twitter Content Filtering Assessment Regulation Computer Accessories Webinar Printers Vendor Management Television CrashOverride Bluetooth IT solutions Troubleshooting Transportation Shadow IT Books Public Computer Loyalty Safety Wireless Technology Benefits Managed Service Provider Worker