• Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Call us at: 877-275-4545

Partner? Login here
Breach Secure Now!Breach Secure Now!
  • Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Degree of Awareness

February 1, 2021 Posted by Art Gross Data Breach, Ransomware, Security No Comments

This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue.  She sent them her portfolio electronically, and they set up an interview using a chat forum.  They asked a few questions and then asked her to fill out forms that were going to put her in the queue to receive work from them.  She completed each one and recommended this to friends, who were all excited about this opportunity that would give them income, experience, and work on a contractor basis. 

Until one of her friends paused as he was asked to give his social security number, his address, date of birth, banking information for payments rendered and so on. 

You can see where this is going.  They were hackers and they had just been handed Jane’s entire identity by merely dangling a carrot of opportunity in front of her. 

How can you possibly think that a job interview is conducted over a chat room? 

How can you hand over so much information without questioning what they need it for?  Or without even questioning if it is legitimate? 

We all likely asked ourselves the same things (and more), but then I thought about it.  Jane is a young adult in her early twenties, she is intelligent, she is not reckless or careless and she has worked two jobs (at the same time) since I’ve known her.  The point is this young woman isn’t a slug or reckless child. 

Then I also realized that her generation wouldn’t question anything about interacting entirely online, never meeting face to face, or even via video.  Electronic communication is their norm and oversharing is all part of the game too, so why would it be strange to have a job interview any other way?  She was working at being an adult and making her own decisions to provide income, so we can’t fault her for that either. 

Hackers know our weaknesses; they know how to gain our trust and they customize their attacks based on the audience.  You think you know what you’d do, but that’s because you can see things clearly from the outside when you aren’t the target.  When you’re in it, you’re less likely to see it so obviously.  Humans are after all, only human. 

As we work to protect our homes, our businesses, our identity, and our families, let’s remember that smart cybersecurity is like a streaming account – everyone is going to have a different profile but still be using the same platform.  Yet the commonality among all of it is that humans are the weak link that will inevitably be the way a cybercriminal gets in the door.  We need to be less judgmental in how it happened, and more united in making sure that it doesn’t happen.  We link virtual arms to make a strong defense, and know that each of us needs the other to be stronger.

 

Tags: Security
No Comments
Share
0

You also might be interested in

Managed Security Services Market to Reach $32.9 Billion in 2020

Mar 28, 2015

Market intelligence from ABI Research estimates the current global market[...]

Survey: Companies worried about disclosure of PII

Apr 14, 2015

A survey by Mayer Brown shows companies consider the disclosure[...]

SEC Investment Management Division Issues Cybersecurity Guidance

Jun 10, 2015

The US Securities and Exchange Commission (SEC) Division of Investment[...]

Leave a Reply Cancel Reply

Dark Web Assessments

Search

Recent Posts

  • Phishing: Targeted Attacks January 20, 2023
  • Human Error January 13, 2023
  • New Year’s Resolution: Train More January 6, 2023
  • Social Security Scams December 30, 2022
  • Last Minute Scams December 23, 2022

Contact Us

  • Breach Secure Now!
  • 55 Madison Ave, Suite 400 Morristown, NJ 07960
  • 877-275-4545
  • info@breachsecurenow.com

Get Social

Schedule a Demo

Recent Blog Posts

  • Phishing: Targeted Attacks January 20, 2023
  • Human Error January 13, 2023
  • New Year’s Resolution: Train More January 6, 2023

© 2023 · Breach Secure Now!

Prev Next