<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Personal Privacy Invasion Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/personal-privacy-invasion/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/personal-privacy-invasion/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Mon, 09 Dec 2024 18:54:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Personal Privacy Invasion Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/personal-privacy-invasion/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Basics of Social Engineering</title>
		<link>https://aditigroup.com/the-basics-of-social-engineering/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 00:13:47 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Health Insurance Portability and Accountability Act]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=441</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<h2 style="text-align: justify;">Where Are You Most Vulnerable?</h2>
<p style="text-align: justify;"><strong>Hackers understand that <em>employees</em> are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year.</strong></p>
<p>Are you familiar with these new Cyber criminal techniques that can leverage ANY connected employee to breach your security?</p>
<p><strong>As an increasing number of employees are forced to work remotely during the COVID-19 crisis</strong>, IT networks have become even more vulnerable to cyber-attack, especially when users connect over unsecure Wi-Fi and/or Home Networks with their personal devices.</p>
<p>In addition to raising awareness about new security threats for your employees, we’ve included 8 tips to help teleworkers (and any connected employees) improve security. You’ll also see recommendations on how ongoing Cyber Security Awareness Training is crucial to a strong defense.</p>
<p>While users are regularly encouraged to keep their anti-virus definitions and software up-to-date, 6% percent of users NEVER receive any type of security awareness training, while another 33% receive only once per year or when they join the company.</p>
<p>&nbsp;</p>
<h3>Key Security Lingo</h3>
<p>Every employee should also become familiar with the latest phishing and ransomware strategies to prevent becoming that weak link.</p>
<h4 style="padding-left: 30px;">Phishing (or Spear Fishing)</h4>
<h4 style="padding-left: 30px;">Vishing</h4>
<h4 style="padding-left: 30px;">Pretexting</h4>
<h4 style="padding-left: 30px;">Business E-Mail Compromise (BEC)</h4>
<h4 style="padding-left: 30px;">Baiting</h4>
<p>From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.<br /> While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust.</p>
<p>Other types of social engineering may include creating distrust, or starting conflicts by altering private or corporate communications. There are literally thousands of variations to social engineering attacks, limited only by the criminal’s imagination.</p>
<p><strong></strong></p>
<h3>Phishing (or Spear Fishing)</h3>
<p>Phishing is the most common type of social engineering attack. Hackers pose as a trusted source (a friend, boss, colleague, bank official, government agency, etc.) and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.</p>
<p>The cybercriminal may obtain your email address from a compromised email account or web directory and then go “Phishing,” sending general emails to everyone, or go “spear fishing,” personalizing an email for just you.</p>
<p>The email will contain:</p>
<ul>
<li>A link that you just have to click on, taking you to a website that asks for your personal information and/or automatically downloads malware</li>
<li>An attachment of pictures, music, movie, document, etc., that has malicious software embedded. </li>
</ul>
<p>&nbsp;</p>
<h3>Vishing</h3>
<p>Another type of phishing, using voice instead of text. The cybercriminal recreates an IVR (Interactive Voice Response) system of a trusted company, attaches it to a toll-free number and tricks you into responding to the cell phone prompts with your personal information.</p>
<p>&nbsp;</p>
<h3>Pretexting</h3>
<p>Pretexting is a social engineering technique of presenting oneself as someone else in a fictional situation in order to obtain private information.</p>
<p>This may be another phishing exploit, or use baiting techniques, but it’s all about developing a believable story, which may include:</p>
<p><span style="text-decoration: underline;">Urgent request for help</span>. Your ’friend’ is stuck in another country and needs money to get home or to pay a fine. Or the CEO sends an email titled “URGENT!!!!!,” with a message containing spelling mistakes.</p>
<p>Ask you to donate to a fundraiser, or some other cause. Disaster relief, political campaign, or charity needs money and/or your personal information to keep you informed.</p>
<p>Notify you that you’re a ‘winner.’ This phishing attack claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to receive your “prize” you will need to provide your bank routing number along with other details to steal your identity.</p>
<p>Pose as tech support or other professional. Also considered a “Quid Pro Quo” attack, the cyber-criminal is responding to an issue, and requests information, and/or a download of a scanner (malicious software) to scan your system. The criminal may be quite helpful and provide productivity tips while stealing your identity.</p>
<p>&nbsp;</p>
<h3>Serious Business Pre Text</h3>
<p>One form of pretexting, called <strong>Business E-Mail Compromise (BEC)</strong> uses a variety of tactics to con the company into wiring funds. The cybercriminal group likely gains access through spear-phishing and/or malware, and then spends weeks or months discovering the organization’s billing process, vendor payments, and the CEO’s email style and travel schedule.<br /> Then when the CEO is out of office, the scammers send a targeted email posing as the CEO to the finance officer (bookkeeper, accountant, controller, or CFO ) requesting an immediate wire transfer. The vendor will sound familiar though the account numbers will be slightly different.</p>
<p>If undetected, the initial and subsequent requests will cost the company thousands if not hundreds of thousands of dollars.</p>
<p>&nbsp;</p>
<h3>Baiting</h3>
<p>This type of social engineering scheme dangles malicious devices inside a seemingly harmless carrier, hoping someone will “take the bait.”</p>
<p>These schemes are often found on Peer-to-Peer sites offering a recent movie, or music to download, but they’re also found on social networking sites, job posting sites, online auctions and e-commerce sites.</p>
<p><!-- /divi:paragraph --></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the harm in sharing your mobile number?</title>
		<link>https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 14:24:31 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=310</guid>

					<description><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, if at all. It therefore, becomes a good identifier of who we are and tied with other publicly available information, becomes the key to unlock a lot of digital information. The article linked below shows the surprise findings of a tech journalist when he gave his mobile number to a security researcher. (click the picture)</p>
<p><iframe title="I Shared My Phone Number. I Learned I Shouldn’t Have." class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F08%2F15%2Ftechnology%2Fpersonaltech%2Fi-shared-my-phone-number-i-learned-i-shouldnt-have.html#?secret=3W3PhXyG4U" data-secret="3W3PhXyG4U" scrolling="no" frameborder="0"></iframe></p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October is National Cybersecurity Awareness Month</title>
		<link>https://aditigroup.com/october-is-national-cybersecurity-awareness-month/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Wed, 16 Oct 2019 22:48:21 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=308</guid>

					<description><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world. Good advice about what to do if you think you&#8217;ve been [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently?  Well, we should think about cybersecurity once in a while!  The linked article is a good general deep dive into how to think about keeping your family safe in this connected world.  Good advice about what to do if you think you&#8217;ve been hacked (something strange pops up on one of your credit card statements for instance).  ABC&#8217;s of cybersecurity, use of VPNs, 2FA, and other good things.  One good idea, if you have a family and want to help introduce the concept of cybersecurity to children who will grow up in this cyberworld, that is to set up a family domain.  If you have questions, please ask.</p>
<p>https://www.ml.com/articles/digital-defense-keeping-your-family-safe-online.html</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You May Have Already Been Stung</title>
		<link>https://aditigroup.com/you-may-have-already-been-stung/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 23 Jan 2015 03:01:51 +0000</pubDate>
				<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[cell phone]]></category>
		<category><![CDATA[cellular]]></category>
		<category><![CDATA[Harris]]></category>
		<category><![CDATA[IMSI Catcher]]></category>
		<category><![CDATA[police]]></category>
		<category><![CDATA[Stingray]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">http://aditigroup.com/?p=86</guid>

					<description><![CDATA[<p>Stingray &#8211; illegal for you, but Law Enforcement uses it without your knowledge or consent. You may have an unusual message in the days leading up to the 2016 Rose Bowl &#8211; authorities could monitor cell phones. Homeland Security&#8217;s deputy special agent in charge told the LA Times their agency would have in place the [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/you-may-have-already-been-stung/">You May Have Already Been Stung</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Stingray &#8211; illegal for you, but Law Enforcement uses it without your knowledge or consent.</em></p>
<p>You may have an unusual message in the days leading up to the 2016 Rose Bowl &#8211; authorities could monitor cell phones.</p>
<p>Homeland Security&#8217;s deputy special agent in charge told the <em><a href="http://www.latimes.com/local/california/la-me-rose-parade-security-20151224-story.html">LA Times</a></em> their agency would have in place the ability to <strong>track cell phone calls</strong> in Pasadena.  The agency says if they needed to monitor calls, they&#8217;d quickly get warrants.</p>
<p><img decoding="async" class="wp-image-87 size-full alignright" src="http://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-tracking-stingray-abc-news.jpg" alt="cell-phone-tracking-stingray-abc-news" width="500" height="288" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-tracking-stingray-abc-news.jpg 500w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-tracking-stingray-abc-news-300x173.jpg 300w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-tracking-stingray-abc-news-200x115.jpg 200w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-tracking-stingray-abc-news-400x230.jpg 400w" sizes="(max-width: 500px) 100vw, 500px" />Is this new?   No.  Not at all.  In fact, you may have already been monitored.  This story on ABC 7 in Los Angeles aired in December 2014.  And they report it&#8217;s been going on for at least a decade.</p>
<p>Read more and watch the video:</p>
<p><a href="http://abc7.com/news/investigation-law-enforcement-use-secret-devices-to-track-cell-phone-signals/421190/">http://abc7.com/news/investigation-law-enforcement-use-secret-devices-to-track-cell-phone-signals/421190/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://aditigroup.com/you-may-have-already-been-stung/">You May Have Already Been Stung</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
