How To Target High Net Worth Individuals On Domain_9
October 2022 / 5 Min Read
Targeting the Family in Pursuit of High-Net-Worth Individuals
High-net-worth individuals (HNWI) are pursued by cyber criminals due to their status within a large corporation, or their financial worth.
High-net-worth individuals (HNWI) are pursued by cyber criminals due to their condition within a large corporation, or their fiscal worth. The domicile network often serves as a gateway to sought-afterward assets, and a successful breach may lead to the unauthorized disclosure of sensitive personal or corporate information. The initial foothold within this network is frequently obtained via devices used by family members.
For this reason, the family unit is a first line of defence against a cyber attack.
Social engineering, a manipulation technique used to perform malicious activities through human being interaction, is the primary means of accessing the home network. Cyber threat actors are deceptive and patient, conducting reconnaissance to reveal family dynamics, online behaviors and personal facts. As an instance, a threat thespian may gather intelligence to design an email and domain resembling a child's school. The thespian then sends an electronic mail stating, "Delight fill out the attached survey regarding remote learning."
The survey is clicked. Downloads. Runs. An initial foothold is at present established.
Wireless router attacks are much less common, but may also provide a foothold when the router is attacked from the wide-area network (WAN) side, or the side attached to the Net. Once an attacker has infiltrated the habitation network, entertainment and internet of things (IoT) devices tin serve every bit mechanisms to enable persistence, or the ability for the threat actor to re-obtain entry over time. Sometimes an attacker will breach a domicile network only to patiently linger until the sought-after data becomes available.
It is critically of import for HNWIs to implement positive security practices in their own households. Children in particular are vulnerable. Just like running a burn down drill, breach simulations can be run across scenarios. The school science fair, for case, provides a prime opportunity for a threat thespian to arroyo a child in a trusting environment. Seemingly beneficial questions can actually reveal valuable information to aid a cyber campaign, and part playing these scenarios is invaluable.
Authors
Faisal Tameesh
Technical Director, Cyber Solutions
To #BeCyberSmart:
Limit social media exposure
Depending on your tolerance, it is advisable to avoid social media. Where feasible, less information is better. Refrain from sharing information regarding personal holdings, job championship and connections to other companies. Be aware of privacy settings across all social media accounts. Train children to not disclose personal information and location.
Implement network segmentation
Isolate not-critical devices from loftier-value devices. Conduct routine inventory of what is running inside your domicile network. Minimize the number of devices online and ensure that every device is running the most recent versions of firmware/software.
Secure pass phrases and passwords
Ensure that every exposed service on every device is protected with a potent password, and preferably a pass phrase. Ensure that default passwords are changed when the devices are configured and see that access points utilize a stiff password and are protected by at least WPA2-PSK for dwelling networks.
You and your family unit members tin make better decisions to make your interconnected world more than secure, and ours too.
Keep Exploring
Cyber Resilience
As function of Cyber Security Sensation Month, nosotros're exploring all of the ways organizations tin can build a sustainable approach to cyber resilience. For more helpful tips and insights, visit our Cyber Resilience hub.
Acquire More than
About Cyber Solutions:
Aon's Cyber Solutions offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to aid clients uncover and quantify cyber risks, protect critical assets and recover from cyber incidents.
Aon'due south Cyber Solutions and Stroz Friedberg, LLC, an Aon company, has provided the data contained in this report in expert faith and for general informational purposes only. The information provided does not replace the advice of legal counsel or a cyber insurance expert and should non exist relied upon for any such purpose.
Insurance products and services are offered by Aon Risk Insurance Services West, Inc., Aon Take a chance Services Primal, Inc., Aon Hazard Services Northeast, Inc., Aon Risk Services Southwest, Inc., and Aon Take a chance Services, Inc. of Florida, and their licensed affiliates.
General Disclaimer
The information independent herein and the statements expressed are of a general nature and are non intended to accost the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information and use sources we consider reliable, there tin can be no guarantee that such information is accurate equally of the date it is received or that it will continue to be authentic in the future. No one should human action on such data without appropriate professional advice afterward a thorough exam of the detail situation.
Terms of Utilise
The contents herein may not be reproduced, reused, reprinted or redistributed without the expressed written consent of Aon, unless otherwise authorized past Aon. To use information contained herein, delight write to our team.
Source: https://www.aon.com/insights/articles/2022/csam/targeting-family-of-high-net-worth-individuals
0 Response to "How To Target High Net Worth Individuals On Domain_9"
Post a Comment