{"id":1437,"date":"2024-03-08T20:56:05","date_gmt":"2024-03-08T19:56:05","guid":{"rendered":"https:\/\/wp.catedu.es\/zgzsur\/?p=1437"},"modified":"2024-03-08T20:58:40","modified_gmt":"2024-03-08T19:58:40","slug":"know-your-personal-threat-landscape","status":"publish","type":"post","link":"https:\/\/wp.catedu.es\/zgzsur\/know-your-personal-threat-landscape\/","title":{"rendered":"Know your personal threat landscape"},"content":{"rendered":"\n<div class=\"twitter-share\"><a href=\"https:\/\/twitter.com\/intent\/tweet?via=cpizaragozasur\" class=\"twitter-share-button\" data-size=\"large\">Twittear<\/a><\/div>\n\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<p>You can apply the threat landscape concept used in enterprise security to yourself to make it easier to stay protected.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"318\" height=\"159\" src=\"https:\/\/wp.catedu.es\/zgzsur\/wp-content\/uploads\/sites\/197\/2024\/03\/download.jpeg\" alt=\"\" class=\"wp-image-1438\" style=\"width:845px;height:auto\" srcset=\"https:\/\/wp.catedu.es\/zgzsur\/wp-content\/uploads\/sites\/197\/2024\/03\/download.jpeg 318w, https:\/\/wp.catedu.es\/zgzsur\/wp-content\/uploads\/sites\/197\/2024\/03\/download-300x150.jpeg 300w\" sizes=\"auto, (max-width: 318px) 100vw, 318px\" \/><\/figure>\n\n\n\n<p>If you try to protect yourself against all the threats in the world, you will soon run out of energy and make your life unbearable. Three-factor authentication here, a twenty-character password with musical notes and Chinese characters there,\u00a0different browsers for different websites\u00a0, and abstinence from social media don&#8217;t exactly sound right for life.<\/p>\n\n\n\n<p>What hurts the most is that using virtually all of these security measures won&#8217;t help protect you against all threats: new ones keep appearing, requiring new protection methods. Meanwhile, most new security layers reduce usability: having\u00a0two-factor authentication\u00a0will never be easier than not having it. And that is the least hateful example. So what can you do? Create your own threat landscape, as companies do when designing their security processes, and protect against only those threats within that landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a threat landscape and what does it have to do with you?<\/h2>\n\n\n\n<p>In the field of corporate security, a threat landscape is the set of cyber issues that threaten a company in a certain industry within a certain period of time. It includes vulnerabilities, malware and ransomware groups, as well as the techniques they use.<\/p>\n\n\n\n<p>An overview of the threat landscape helps define what exactly the business needs to protect against. Some threats will be more pressing than others, depending on the company&#8217;s location and activity. And since a security budget always has its limits, as does the number of security personnel, it makes sense to protect against truly relevant threats.<\/p>\n\n\n\n<p>Why not create a threat landscape like that and base your own personal security strategy on it? This way you will avoid having to carry multiple layers of protection and you will be able to continue using the Internet with some comfort.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Build a personal threat landscape<\/h2>\n\n\n\n<p>Every individual, like every company, has their own threat landscape. Whether you use TikTok or Instagram or have a\u00a0password manager\u00a0or not influences which threats are most relevant to you. Many other factors also influence, such as where you live, what operating system you have on your computer, what instant messaging applications you use and who you correspond with through these applications.<\/p>\n\n\n\n<p>That said, all of these personal threat scenarios have certain elements in common, as we all live in the 21st century, we all use computers and smartphones, and we all browse the Internet. Therefore, for the purposes of this discussion, a personal threat landscape can be divided into common and individual parts, with the common part being mostly applicable to everyone, and the individual part being determined by the person&#8217;s particular situation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The common part of a threat landscape<\/h3>\n\n\n\n<p>If you are a regular reader of this blog, you will have a rough idea of \u200b\u200bthe most frequent and relevant types of threats regardless of the country of residence. First of all, these are\u00a0<strong>phishing<\/strong>\u00a0,\u00a0<strong>data leaks<\/strong>\u00a0and\u00a0various\u00a0<strong>scams<\/strong>\u00a0. Every person needs to keep themselves protected against these.<\/p>\n\n\n\n<p>The best protection against phishing is learning how to detect it. To do this, you must do the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Find out what\u00a0phishing\u00a0is ;<\/li>\n\n\n\n<li>Get an idea of \u200b\u200bthe\u00a0main tricks\u00a0that phishers use;<\/li>\n\n\n\n<li>Learn the\u00a0typical signs of phishing\u00a0, such as a suspicious sender address (pun intended), suspicious links, etc.<\/li>\n<\/ul>\n\n\n\n<p>Protecting yourself against data leaks is more difficult, since in most cases it is not your fault, but rather some service you use. Since each of us uses many services on the Internet, from\u00a0social networks\u00a0to\u00a0online stores\u00a0, and from\u00a0insurance companies\u00a0to\u00a0\u00a0delivery services\u00a0, it is difficult to control each of them.<\/p>\n\n\n\n<p>You generally need to be prepared for breaches, while\u00a0any of Kaspersky&#8217;s new products\u00a0with a data breach alert feature can help you monitor data that&#8217;s relevant to you. Monitoring is undoubtedly a good thing, but what about the data that is leaked? Well, this is something you can only answer: change passwords quickly, block your bank cards\u00a0if necessary\u00a0, and be aware that the fact that they address you by your full name in an email signed with the name from your personal account manager is no guarantee that the email actually comes from your bank. The bank&#8217;s database may have been leaked and used by scammers for phishing.<\/p>\n\n\n\n<p>Finally, there are\u00a0many types of scams\u00a0in the world, which differ significantly between countries. Still, they have common characteristics. As with phishing, knowledge is your best protection. Therefore, keep reading\u00a0our blog\u00a0to learn about different types of scams and critically analyze everything that is too good to be true or seems dangerous and\u00a0demands an immediate response from you\u00a0: Scammers usually play on human greed or try to put their victims under stress to make them nervous and make them lower their guard.<\/p>\n\n\n\n<p>Phishing, data leaks, and scams are the three most common types of threats that are relevant to everyone. Next, we&#8217;ll look at the individual part of a threat landscape, which depends on who you are and your online habits.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The individual part of a threat landscape<\/h3>\n\n\n\n<p>To create a personal threat landscape, you first have to introspect and analyze yourself and your habits. What websites and instant messaging services do you use? Do you have your own work phone? Do you work from home or from an office, and what computer do you use?<\/p>\n\n\n\n<p>Next, based on your answers to the questions above, you can begin to create a threat landscape and relevant security measures simply by going through the list.<\/p>\n\n\n\n<p>Let&#8217;s say you are an active social media user. In this case, you must protect yourself against\u00a0account hacks\u00a0,\u00a0ban attacks\u00a0and account hijacking (\u00a0Instagram\u00a0,\u00a0Facebook\u00a0). You should also set the appropriate privacy settings on\u00a0Instagram\u00a0,\u00a0Facebook\u00a0,\u00a0TikTok\u00a0, and\u00a0Twitter\u00a0.<\/p>\n\n\n\n<p>The state of privacy on specific social networks, such as Vivino (for wine lovers) and Untappd (for beer lovers), is pitiful: your alcoholic discoveries are visible to anyone by default. If you&#8217;d rather not share your weekend binge with the world, be sure to set up these apps to keep your\u00a0wine\u00a0or\u00a0beer\u00a0adventures your little secret.<\/p>\n\n\n\n<p>Or, let&#8217;s say, you are an avid gamer and Steam user. If so, you need to protect yourself from Trojans that steal user accounts and from scammers who have their\u00a0own systems\u00a0\u00a0to carry out this type of activity. What can you do about it? Learn about\u00a0Steam scams\u00a0and configure the\u00a0service&#8217;s security features\u00a0.<\/p>\n\n\n\n<p>Let&#8217;s say you are a blogger or the owner of a popular Telegram channel. Well, your biggest threats are\u00a0account theft\u00a0and\u00a0doxing\u00a0, the latter more commonly\u00a0experienced by women\u00a0. What can you do about it? Learn how accounts are often\u00a0hijacked\u00a0and get a\u00a0reliable security product\u00a0to neutralize Trojans and alert you to phishing and personal data leaks.<\/p>\n\n\n\n<p>Even if you decide that you are no longer interested in social networks or games, do not leave your accounts hanging, unattended: they could be hacked and used against you by accessing your personal data. The worst thing is that you won&#8217;t find out soon, or ever. Therefore, we recommend that you consult our guide on\u00a0how to manage accounts you don&#8217;t use\/need\u00a0.<\/p>\n\n\n\n<p>Many naively believe that they can only encounter cyber fraud in their personal space, while at work is secure and monitored by trained professionals and generally no place for scams or phishing! Nothing could be more wrong. If you&#8217;re looking for a job, you could be the\u00a0perfect target for scammers\u00a0. If you&#8217;ve recently started working at a new company,\u00a0keep your eyes peeled\u00a0for fake coworkers. If you work remotely or use a personal computer for work,\u00a0configure your workspace\u00a0so that it does not harm your employer and research\u00a0what software you should not use for work\u00a0.<\/p>\n\n\n\n<p>Finally, be especially careful if you are a cryptocurrency investor: since cryptocurrency transactions are not protected by laws, it is essential to choose the right\u00a0storage strategy\u00a0. Remember that even\u00a0cold wallets can be hacked\u00a0, you should take all\u00a0measures to secure your wallets, private keys and seed phrases\u00a0.<\/p>\n\n\n\n<p>However, even those who\u00a0have covered all the bases\u00a0, installed a\u00a0reliable program to store passwords and personal data\u00a0, and protected all possible accounts with\u00a0two-factor authentication\u00a0, should think in advance about what they would do if their smartphone with the authenticator app crashed. broken, lost or stolen. Check out our tips on how\u00a0to back up an authenticator app\u00a0or try to\u00a0recover it\u00a0if you&#8217;ve lost your phone before you can make a backup.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>This is how you build your own personal threat landscape: review every area of \u200b\u200byour cyber life. Although it sounds sad, the last step in creating a threat landscape is to make\u00a0a digital will\u00a0.<\/p>\n\n\n\n<p>By designing your own personal security strategy around your own threat landscape, you&#8217;ll get it done faster and keep things simpler by trying to protect yourself from everything at once. Naturally, you will need knowledge of cybersecurity and online privacy to be successful at this.\u00a0Subscribe to our mailing list\u00a0to receive new posts and study threats that belong to your personal threat landscape.\u00a0Our security solutions\u00a0can help you neutralize these threats, control data leaks, and store personal data securely.<\/p>\n\n<div class=\"twitter-share\"><a href=\"https:\/\/twitter.com\/intent\/tweet?via=cpizaragozasur\" class=\"twitter-share-button\" data-size=\"large\">Twittear<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You can apply the threat landscape concept used in enterprise security to yourself to make it easier to stay protected. If you try to protect yourself against all the threats&#8230;<\/p>\n","protected":false},"author":355,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"yes","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1437","post","type-post","status-publish","format-standard","hentry","category-android"],"_links":{"self":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/1437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/comments?post=1437"}],"version-history":[{"count":2,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/1437\/revisions"}],"predecessor-version":[{"id":1441,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/1437\/revisions\/1441"}],"wp:attachment":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/media?parent=1437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/categories?post=1437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/tags?post=1437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}