Greensboro, N.C. - Is this the new normal? One Tweet and Wall Street goes wild? A fake Tweet sent out by someone who hacked the Associated Press' Twitter account sent the Dow plunging 150-points within four minutes.
Why? Computerized trading programs often buy and sell stocks based on news feeds and social media sites.
How vulnerable are you? What about our local businesses that have your information? How secure are they?
When you think of a hacker, you might picture someone sitting in their home trying to break into a system. This does happen. However, there are plenty of other holes in company security.
For example, if you leave someone alone in a company conference room with an internet connection, they can plug in a device and get access to the company's network. Plus, more and more people bring in personal iPads or flash drives to work. Every time an employee plugs a flash drive into a company computer, that opens a door for a hacker.
If your business has WIFI, a hacker can sit in the parking lot and break into an unsecure system in a matter of seconds.
"Sometimes there are things that are so glaring and they can't believe they didn't see that," Barry Utesch, owner of Total Computer Solutions, said.
Total Computer Solutions works with companies to help make their systems more secure.
"More and more of your personal information is out on the net or one someone's network and, so potentially, vulnerable," Utesch said.
So, you might want to hire a "Certified Ethical Hacker." It's essentially someone your company hires to try to hack into your system and then help you patch the security holes.
Many companies are shocked at how vulnerable they are.
"In about eight seconds, I had their wireless key. I said, 'Did you know this wasn't secure? They said, 'Nobody has the key.' I said, 'I have your key.' I was in their server, in their file with their company data open, all their tax information, all their clients, all their social security numbers, right there on my computer," Jocat Conner, a Certified Ethical Hacker and Network Engineer at Total Computer Solutions said.
Conner says the biggest mistake people make is having a weak password. It sounds obvious, but if your password is a word you can find in the dictionary, it's a bad password. Hackers have devices that will literally try every word in the dictionary in a matter of seconds.
Instead, choose a password that contains upper and lowercase letters, numbers and special characters. The best passwords are basically a random series of letters, numbers and characters.