Hacker Tricks, Shadow IT, and Mobile Threats: Cybersecurity Tips
When our founder, Eddie Clark, joined the Smarter Online Safety podcast, he wasn’t there to hype tools or spread fear. He was there to clear up confusion. Cybersecurity isn’t just for big companies or IT experts. It’s for every person who opens a laptop, uses a mobile device, or clicks on a link they think is safe.
He has been in the industry for over 30 years and has built his reputation by helping businesses turn chaos into clarity. He explained why so many people get caught off guard, even when they think they’re protected.
The threat landscape is evolving fast, and attackers no longer need advanced skills. They need motivation, free tools, and a target that assumes “this won’t happen to me.”
Eddie’s core message:
If you're not actively managing your digital risk, you’re leaving the door open.
Here are seven practical insights from his conversation with host Jocelyn King:
1. MFA Can Be Hacked
Multi-factor authentication is still important, but it’s not foolproof. Attackers can intercept MFA tokens using man-in-the-middle attacks, especially on unprotected networks. That’s why Eddie pushes for layered security. Use passphrases, password vaults like Bitwarden or 1Password, and encrypt your traffic whenever possible.
2. Your iPhone Isn’t Immune
Eddie called out a common myth: “I’m on an iPhone, so I’m safe.” Mobile devices can absolutely be exploited, especially if updates are ignored or apps come from unvetted sources. Treat mobile devices like any other endpoint. Use antivirus tools, enable auto-updates, and never assume a brand name equals protection.
3. Public Wi-Fi Is a Playground for Criminals
Connecting to free Wi-Fi at a coffee shop or airport might seem harmless. But Eddie shared real-world stories of hackers setting up fake hotspots with nearly identical names to trick users into joining. Once connected, they can capture passwords, keystrokes, and session data. If you must use public Wi-Fi, always use a VPN.
4. Shadow IT Can Open the Door to Hackers
When a staff member installs a smart TV or connects a personal device without alerting IT, that’s shadow IT. These devices often lack proper security and aren’t monitored. Eddie recommends creating a separate guest or IoT network to isolate these devices from core business systems. A little segmentation can prevent a lot of headaches.
5. Updates Aren’t Optional
Every patch that gets released fixes something. If you delay applying it, you’re leaving the vulnerability wide open and hackers know it. Eddie urges businesses and individuals alike to install updates promptly and reboot when required. Those “remind me later” clicks can turn into costly mistakes.
6. A Honeypot Can Buy You Time
For organizations that want to stay one step ahead, honeypots are a smart move. They’re decoy systems designed to attract attackers and raise alerts. Even a basic honeypot can help cut dwell time and alert your team before damage is done. It’s not just for enterprises. Small businesses can and should use them too.
7. Ask Your IT Provider the Hard Questions
Don’t just compare price tags when evaluating IT partners. Ask what happens when something goes wrong after hours. Ask how they detect threats in real time. Ask if they carry cyber liability insurance. Eddie warns that a cheap quote without clear answers could cost you far more in the long run.
Watch the Full Interview
Eddie’s appearance on the Smarter Online Safety podcast is worth your time. Whether you’re an executive, a business owner, or the default “IT person” for your office, his guidance is practical and relevant.
You can watch the full interview on YouTube or listen on your favorite podcast app. And if you’re ready to understand where your business stands today, book a free cybersecurity threat assessment.