Notes from how to hack a humanist

Hi everyone! 2 weeks ago, I conducted a short workshop/talk for humanists on privacy and cyber security. The audience expressed via a poll that they are reasonably confident in their privacy and security posture – it’s either foolish or expensive to be extremely confident!

A short walk-through of how hackers can overcome protection from firewalls by “getting inside from inside” through phishing emails and malicious attachments or documents. The barrier of conducting such activities has been lowered thanks to the Malware-as-a-service or Ransomware-as-a-service industry in the hacker forums.

An example of a malicious document

It’s emphasized that unless you’re rich or famous, you are very unlikely to be specifically targeted. Instead, these cyber attacks are mass-market, opportunistic, and aims to profit from the small percentage of the population who just happen to fall for the phish.

To reduce the likelihood, one needs to have a simplified understanding of the information lifecycle, information classification, and their risk appetite for their information and security.

Thereafter, apply the 3Rs (amongst many other privacy and security best practices)

  1. Reduce digital footprint
  2. Do not Reuse passwords
  3. Recycle carefully

For further information or consultation, reach me at https://www.linkedin.com/in/danthio/