The 2019 Cyber Security: Essential Threat List
The 2019 Cyber Security: Essential Threat List
The 2019 Cyber Security: Essential Threat List
Privacy Mobile
With increased regulations to Mobile phones today are mini
guard personally identifiable computers that can hold
information, mistakes valuable information
can be very expensive
Data leaks
A data leak is the intentional or unintentional
release of secure or private/ confidential information
to an untrusted environment. Failure to report a leak
can have severe consequences for the individual
and lead to hefty fines for the company.
Essentials Privacy
Ransomware
Essentials Internet
Phone Locking
Essentials Mobile
Vishing
V i s h i n g i s t h e t e l ep h on e eq u ivalen t o f p h is h in g .
I t i s d es c r i b e d a s t h e act o f u s in g th e telep h on e
i n a n a t t em p t t o s c a m th e u s er in to s u rren-
d e r i n g p r i va t e i n for m ation th at will b e u s ed for
i d e n t i t y t h e ft .
Mobile Social
Unknown network
It is very easy for a hacker to set up a Wi-Fi access
point, but if you connect, much of your
communication can be monitored or
even manipulated.
Essentials Social
Mobile listening
Autofill
Often confidential information leaks out because
email senders are in a hurry or distracted and
select the wrong recipient.
L ea v i n g you r c om p u t er u n locked an d
u n a t t e n d ed c a n c a u s e s eriou s p rob lem s
i f s om eon e e l s e h a s acces s to it .
Essentials Privacy
Same Password
Essentials Mobile
Malicious Attachments
Essentials Email
Removable Media
R e m ova b l e m e d i a i s a com m on way to m ove
l a rg er a m ou n t s o f d a ta. T h e ris ks are n u m erou s,
i n c l u d i n g d a t a l os s, m alware th reats an d m is-
p l a c e m en t res u l t i n g in rep u tation al d am ag e.
Social Engineering
Dumpster Diving
D u m p st e r d i v i n g i s a tech n iq u e to re trieve
s en s i t i ve i n for m a t i on th at cou ld b e u s ed to
a c c e s s a c om p u t er ne t work . I t is n’t lim ited to
s ea rc h i n g t h rou g h t he tras h for d ocu m en ts.
Spyware
CEO Scam
Internet Social
Clean Desk
M a i n t a i n i n g a c l ea n d es k in clu d es n o t leavin g
s e n s i t i ve d oc u m e n t s on th e d es k , n o t writin g
p a s sword s on st i c ky n o tes, clean in g s en s itive
i n for m a t i on o f f a w h ite b oard , an d n o t leavin g
a n a c c e s s c a rd w h e re it m ig h t b e stolen .
Computer Installs
Ke ep s o ft wa re u p t o d ate to d e fen d ag ain st
s e r i ou s i s s u es. V i r u ses, s pyware, an d o th er
m a l wa re rel y on u n patch ed an d ou td ated
s o ft wa re .
Essentials Internet
Password Handling
Essentials Internet
Printouts
Pr i n t i n g d oc u m e n t s an d leavin g th em in th e
p r i n t er c a n g i ve u n a uth orized p ers on s acces s
t o c on f i d e n t i a l d a t a .
Confidential Material
Pr i va t e m e d i a i s o ft e n n o t reg u lated an d
s om e t i m e s u n s e c u re . Un d erstan d in g th e ways
a h a c ke r m i gh t ga i n acces s to u n au th orized
d a t a i s i m p or t a n t .
HTTPS
Spear Phising
Essentials Social
Free WiFi
Home WiFi
Keylogger
A keylogger is a piece of malicious software or
hardware (a small device connected to the
computer keyboard) that records every keystroke
you make on a keyboard.
At the office
How to make your employees
aware of the risks?
When defending your systems and software
against cyber threats, technological
solutions alone are not enough to mitigate
the risks. Studies show that 91 per cent of
successful breaches rely on human errors.
We will try to update this list with new content as often as possible.
If you feel that anything is missing, please let us know at awarego@
awarego.com.
Ragnar Sigurdsson
Founder & CEO, Ethical Hacker, CISSP
AwareGO
Simple & Effective Security Awareness
Phone
+354 899 4370
Email
[email protected]
Address
AwareGO, Borgartun 27,
105 Reykjavik Iceland