It’s almost Thanksgiving, and regardless of whether or not you celebrate the occasion, now is a great time to sit back and reflect on all the goodness and bounty we have in our tech-filled lives. Think about it. Just 10 years ago, iPhones were still two years away, Uber was a German word, and you could only use Facebook if you had aced the SAT’s and got yourself into Harvard.
Social Engineering is a pretty hot topic nowadays. It seems like every time you turn around there is another story about a major corporation, important person or institution whose data has been compromised. Often, these hacks began with an email that shouldn’t have been opened, or the revealing of information that should never have been told.
No, these attacks are not the brainchild of some evil tech genius, cranking out infected code and overrunning systems with malware. Rather, they are the results of an art that dates back as far as human existence, when the first cave man convinced the second cave man that it was entirely worthwhile to trade his woolly mammoth for a handful of rocks.
It’s fun to be scared by frightening costumes and pranks at Halloween. Heck, who DOESN’T like a good DIY zombie get-up? But one thing that’s definitely NOT fun is being hit by a real-life cybercriminal who is trying to hack into your PC or steal your identity.
After all, ghosts, witches, and haunted houses are one thing. Having your PC turned into a zombie, your email hacked by a cybercriminal, or all the data on your computer held ransom by a cyber con artist – well that’s something altogether different.
National Cyber Security Awareness Month (in the US) and European Cyber Security Month (in Europe) are coming to an end, which makes this the perfect time to double and triple check your cyber safety. Do you approach your use of the internet with a grain salt or are you reckless? Are you doing all you can to protect yourself from online trouble or are you just a hack waiting to happen?
Read the statements below and make 100% sure that they don’t describe your online behavior. If just ONE of them rings familiar, then it’s time to change your online behavior ASAP. Your personal privacy and security depends on it.
Ahh…. IoT.
If those three little letters don’t strike at least a bit of fear in your heart already, then they probably will after you read this.
If you recall from Part I, the Internet of Things (IoT) affords people with lots of cool and exciting conveniences. But before you run off to buy a computer chip for your goldfish, it would be wise to remember that every device that’s connected to the internet can become a target to hackers. And as you may imagine, that’s not always a good thing. Here are some more reminders that more connectivity is not necessarily better. And after these examples, we’ll give you some tips on how to protect yourself.