High-net-worth individuals (HNWI) are pursued by cyber criminals due to their condition within a large corporation, or their fiscal worth. The domicile network often serves as a gateway to sought-afterward assets, and a successful breach may lead to the unauthorized disclosure of sensitive personal or corporate information. The initial foothold within this network is frequently obtained via devices used by family members.

For this reason, the family unit is a first line of defence against a cyber attack.

Social engineering, a manipulation technique used to perform malicious activities through human being interaction, is the primary means of accessing the home network. Cyber threat actors are deceptive and patient, conducting reconnaissance to reveal family dynamics, online behaviors and personal facts. As an instance, a threat thespian may gather intelligence to design an email and domain resembling a child's school. The thespian then sends an electronic mail stating, "Delight fill out the attached survey regarding remote learning."

The survey is clicked. Downloads. Runs. An initial foothold is at present established.

Wireless router attacks are much less common, but may also provide a foothold when the router is attacked from the wide-area network (WAN) side, or the side attached to the Net. Once an attacker has infiltrated the habitation network, entertainment and internet of things (IoT) devices tin serve every bit mechanisms to enable persistence, or the ability for the threat actor to re-obtain entry over time. Sometimes an attacker will breach a domicile network only to patiently linger until the sought-after data becomes available.

It is critically of import for HNWIs to implement positive security practices in their own households. Children in particular are vulnerable. Just like running a burn down drill, breach simulations can be run across scenarios. The school science fair, for case, provides a prime opportunity for a threat thespian to arroyo a child in a trusting environment. Seemingly beneficial questions can actually reveal valuable information to aid a cyber campaign, and part playing these scenarios is invaluable.