Imagine a scenario, two children are walking near a park when a stranger approached them in a SUV. The stranger tells the children that the brother of one of them “has been in a serious accident” and he had been asked to come pick them up.
What do the children do?
Violence, in all of its various forms, is a blight on a free society built upon individual rights and liberty. Nothing else flies in the face of freedom like the disregard for human life shown in Pittsburgh at the Tree of Life Synagogue where a gunman killed 11 people and injured several others. In his comments to the press, the President speculated that an armed security officer might have drastically impacted the outcome in a very positive way.
Every user of a computer is subject to a social engineering attack. In such an attack, the goal is to tempt or trick a user to provide their credentials to some computer resource – for example, their workstation or laptop; their e-mail, or their network logon – so the attacker can gain access to the resource. Once the attacker gains access, they leverage that access to penetrate even deeper into the user or company’s privacy to either gain access to data that is usable to the attacker, or to exploit the resource to attack other systems or networks.
As flooding, erosion, downed trees and power lines close roads or entire areas, Mother Nature also wrecks havoc with communication channels and in particular access to CCTV systems. Even cellular based communication becomes intermittent or completely unavailable. To mitigate this challenge, businesses are incorporating technology and specialized teams into their recovery operations.
Like it or not, we live in a digital world. Every move we make in our lives is recorded by our cars, smartphones, computers, tablets and whatever other technology we use. While all of this technology makes are lives much easier, it also puts us at high-risk for cyber attacks if we don’t take the necessary precautions.