HAVE TRUST ISSUES
Veronica Sackey, CC
Network Security Engineer ? Fintech | ISC2 CC | Podcaster | Technical & Creative Writer | Cybergirl 4.0 Cisco Packet Tracer | Wireshark | SEToolkit | Fortinet
If the golden rule of life is, "He who has the gold, makes the rules," the golden rule of Cybersecurity certainly is, "Have trust issues."
Social engineering, the science and art of manipulating people to compromise their security, has always been the king source of cyber-attacks. Social engineers thoroughly study society, understanding what makes people tick, and then use that knowledge against them, luring victims into significant losses.
Many individual and organizational exploits resulted from social engineering, met with people trusting too easily. Exploited network traffic, hacked social media accounts, and stolen financial credentials all occurred because someone trusted way too quickly.
The goal of this article is to increase your awareness of the threats around you. Consider this: someone can study your online profile, learn about your friends, and begin following you. They gain your trust and then launch an attack. Alternatively, someone might pretend to be a person you trust, only to steal your personal information. Therefore, it is crucial to always double-check identities before sharing private information.
And before you dismiss the idea, thinking, "Cyber-criminals have no reason to exploit me," remember that access to any member of the supply chain is access to the larger target organization. Cyber-criminals only need access to you to harm an entire organization, whose service you use. Like the Gen Zs say, stay woke! Protect everyone around you.
Until next time,
Your friend in Cybersecurity,
Veronica.
Glossary:
Cybersecurity: Protecting computer systems, networks, and data from digital threats and attacks.
Exploit: Taking advantage of vulnerabilities in software or systems to gain unauthorized access or control.
Threat: Any potential danger or risk to computer security, including viruses, hackers, or malicious software.
Cyber-criminal: A person who commits crimes online, such as hacking, fraud, or identity theft.
Cyber-attack: Deliberate actions to compromise or disrupt computer systems, often with malicious intent.
#Cybersecurity #Feynman #professionaldevelopment #personaldevelopment
Cybersecurity Analyst | Penetration Tester| Web Application Security | ??Member @BlackSistersInStem
10 个月Human is the weakest point in cybersecurity thus, making social engineering a great tool for cyberattack ..it can be anyone. Having trust issues is one of the best way to minimize cybercrime.