Tweaking your victim profile

The Netflix movie – The Accused was so intensely accurate in terms of what has happened and could indeed happen again to someone being wrongfully accused via our glorious social media ecosystem.

I had to stop watching it halfway through just to analyse the touch points (spoiler alert) –

Reading classification – personal threat, injury detail, discrimination, suicide

The victim profile

Threat / eventPossible risk counter measures
High number of followers 200+Do you know all these people?
Open profile – public access to personal data, followers, posts etcLimited how unknowns can tag you
Connected family and friend’s profiles are open and contain meta data such as location details, home address etcLimited how unknowns can map your relationships
Phone location services openTurn off when no Apps not in use
Images taken by 3rd party in public revealing locationTough one to tackle as people are always snapping
CCTV data mapped with social mediaAlmost impossible to hide
Monitoring a hashtag in real timeNo real reason to do this unless you are actually going to react
Online rumour pushed as factResponse to accusations in real time by key social media channels, put out a pubic statement, engage a legal advisor.
Online threat to life reported by phoneReport online and get a crime number
Open-source intelligence (OSINT) data used to compile and share personal data on public forums anonymously.Check yourself to see what you are sharing publicly
Sometimes you just need to help yourself

It’s not business it’s personal

Ever tried watching a small business owner struggle to send private data securely? Inadvertently, they fallback to sending passport or credit card details over WhatsAPP. Not so bad as it’s end-to-end encryption right?

So this is not so bad and you have nothing to hide right?

Not many small business owners have the time or money to spend on drilling down to the right controls that should be in place for their business and naturally use what they use in the personal lives which often means the bare minimum.

Additonally, unless directly linked to finanical issues Data protection comes in last. So what can be done prior to a data breach incident for small business?

Firstly, take the personal pulse out of the mix and work with someone who is tech savvy and thinks like a business person with risk in mind.

Happy, Cyber Truck hunting.

Man in the Mirror moment

17 days ago, I was washing and splashing about with an elephant…yes, a real adult elephant in Indonesia. Today, I am trying to work out how to tackle my well-overdue CCAK exam.

So my tactic is to do a little bit of daily work and build up my exam readiness muscle memory.

This is by no means easy as my struggle is distraction avoidance. With my PS5 secured and stored in my garage, there will be no game time just a second-hand view on Twitch.

/cryptic

It’s been a couple of months since checking on my OMNI mining account and oh no, their SSL certificate is invalid.

If a Crypto company cannot deal with a simple Secure sockets layer (SSL) certificate for their own website then it’s time to worry.

I contacted my sponsor….too be continue.

….turns out the provider just set up a new domain, lawd knows why but it’s up and running.  My crypto mining balance is still crap though.