
1. Tourism
We all have a device with personal and work information on it. When traveling your device will be exposed to new networks , free WiFi connections and many other methods to infiltrate your system this environment sets the perfect tone for the black hat hacker (bad guy).
2. Protect your mobile phone.
Whether you are aware of it or not our mobile cellphones are being monitored 24/7 either by your service provider of a third party like facebook now Meta . You do everything on your phone so that means everything is accessible. More Business cyber attacks are due to internal incompetents , where the employee was oblivious to the attack , your work email is linked to your phone , your phone is linked to your personal life …… You’ve effectively established a third party network of vulnerability within your own network .
3. Social media SHARE share SHARE
I get it , you wanna post everything ! But don’t , the more you share about yourself the easier it becomes to determine your persona , location and this makes it simple for the cyber attack to create an approach potentially impersonating your desires (Phishing).
4. Deepfake Technology
The most recent deepfake attempt was when Russia published news of the Ukrainian president , the request was for Ukrainian soldiers to stand down , fortunately Volodymyr Zelenskyy responded quickly enough to convince the believers that it was actually a Cyber-Attack . This tech uses software to manipulate facial features (be careful with facelock , your biometrics are being captured) , voice patterns and most features you’d expect to see when you have a video call , only thing is it might not be who you think it is.

Leave a comment