Go to main contentsGo to main menu
Friday, April 24, 2026 at 7:01 AM

You've been hacked and you probably don't even know it, cyber-security expert Ira Victor says

You've been hacked and you probably don't even know it, cyber-security expert Ira Victor says
By Ray Hagar, Nevada Newsmakers

There is no such thing as computer network that has not been hacked or compromised, a leading expert said Monday on Nevada Newsmakers.

"The experts today say there are only two types of computer networks," said Ira Victor, digital forensic analyst for, DiscoveryTechnician.com. "Those are networks that have been compromised and the owners of those networks know where they have been compromised, how far and what data; and networks that have been compromised and the owners don't know where the compromises are and how far they have gone in and what data.

"We are at that point and with the experts, that is pretty much consensus on that opinion," Victor said. "All networks are compromised and its just how much you know about it and how much you don't."

Businesses and other entities with computer networks may not be aware of the hack but can still be compromised, Victor added.

"The cyber criminals are breaking into networks with such frequency and such ease that they don't always exploit that network right away," Victor said. "Or they do other types of techniques that are exploiting the networks but they keep a low profile so that the people that are running the business or working the business have no idea."

Firewalls and other computer security services are not security blankets for computer systems, Victor said.

Veteran Nevadan Journalist Ray Hagar is known for fair and tough reporting and invigorating commentary.


"So anti-virus (programs) and firewalls, you want to have them but they only offer very minimal protection," he said. "They do not keep the bad guys out of your network."

Victor, who has testified about cyber-security at the Nevada Legislature, said the state of Nevada (and many businesses) can't afford to secure every bit of information in their systems. So those entities should concentrate on what is the most important data that needs protection.

"The first thing I would suggest for the state (of Nevada) is that the state needs to have an inventory of what information they have and rank it in terms of the most valuable information and start concentrating their resources on protecting the most valuable information," Victor said. "Guess what? That is a recommendation I have for all businesses and all organizations.

"If the bad guys are in your network -- and they are --  and if they are there persistently -- and many times they are -- then it is often not cost effective to protect everything, every little shred of information and every single communication in your network. So we need to rank them and say, 'What is our most valuable asset? What are our crown jewels? And then, concentrate our resources on protecting our most valuable assets."

Business and government don't earmark a lot of money toward cyber-security, Victor said.

"Were not going to get a lot of money for information security," he said. "Let's just be realistic about this. It is the same as in business. So you've got to concentrate your energy on the crown jewels -- the most valuable information -- and acknowledge that is what you are going to do."

Victor also said 'Information Technology," or IT, is not the same as information security, Victor said.

Information Technology, culturally, the people in IT are taught to deliver services on time and on budget," "The cyber criminals are breaking into networks with such frequency and such ease that they don't always exploit that network right away," Victor said. "So if we have less than $10,000 to spend, we figure out a way ... so we've got to 'stand up' those systems, as we like to say, and deploy them and do the best we can with the $10,000 we have over the next three years. That is the culture of IT.

"In information security, we look at risk, our culture is about risk," he said. "What is the data we have? What are the risks? How do we mitigate those risks?

"And then we go to our decision makers and say, 'Here are the risks. Here are the liabilities. If you want protect that data, here are the steps that need to be taken.' "

When government agencies or businesses try to protect all their cyber information, that is a good thing for the "bad guys," Victor said.

"There is a laundry list of valuable information that organizations have," Victor said. "And they are not doing enough to protect it. Now some of it has to do with economics. It's expensive. That is why we've got to concentrate efforts and say, 'Hey, these are our most valuable information assets and we're going to protect them and really do a strong effort to do so. And we are not going to stop the cyber criminals until we do that. I mean, bad guys are having a field day because we're saying, 'Well, all of our information is valuable. and then none of it gets well protected, or not enough of it gets well protected."

Watch this episode of Nevada Newsmakers here.

See the upcoming schedule of Nevada Newsmakers here.

Share
Rate

Comment

Comments

COMMENTS
Comment author: Jack & Nancy CookComment text: Wonderful man. Created a precious family with Linda. Will always respect and admire his contribution to teaching at FHS.Comment publication date: 4/18/26, 10:27 AMComment source: Howard David JacksonComment author: JeffDickersonComment text: Very well reported, even though our motion was denied.Comment publication date: 4/15/26, 11:05 AMComment source: Judge allows Fernley City Council to proceed with corrective agenda item in Lau expulsion caseComment author: Todd fossumComment text: Hi my name is todd fossum i'm clarence's stepson, I was wondering if he had any siblings. I think he said he had a sister that just survived cancer. If she can get ahold of me or any buddy, my number is 916. 3 4 3 1 1 7 7.Thank you have a blessed dayComment publication date: 1/16/26, 4:33 PMComment source: Clarence L Shields C Comment author: Carl HagenComment text: So just curious, what is the point of a franchise agreement if it is not exclusive?Comment publication date: 12/15/25, 4:18 PMComment source: Council approves non-exclusive franchise agreement for waste collection C Comment author: Christine S GleasonComment text: In the first photo, the woman in the middle, wearing the black shirt, is SaraH Jean Gleason. She is not an FHS Leadership Student but is the person who is responsible (with the help of her father) for starting the Fernley Community Thanksgiving Dinner in 2011. She attended this year's dinner while home from Arizona State University, where she is working on her PhD.Comment publication date: 12/8/25, 8:52 PMComment source: About 400 meals served at Community Thanksgiving DinnerComment author: SusanComment text: RIP Sean. Prayers to the family, sorry for your loss.Comment publication date: 9/25/25, 1:11 PMComment source: Sean Everett Turner
Community Foundation