In this class, we study the Quantitatif Dark Arts.
They “are many, varied, ever-changing, and [seemingly] eternal. Fighting them is like fighting a many-headed monster, which, each time a neck is severed, sprouts a head even fiercer and cleverer than before. You are fighting that which is unfixed, mutating, éternel.”
Today, should you choose to pay application and follow the lessons of the illustrious Mistress Minerva, you might just learn a thing or two that’ll put you head (and shoulders) above the rest.
First things first, let’s review our syllabus.
Understanding Security Threats

Class is in séminaire.
You are here learning to defend yourselves against that which cannot easily be seen.
Dark creatures abound on the Internet. As we progress through our lessons, we’ll seek to identify and uncover them — all the while discovering what incantations and ingredients best keep their dastardly deeds at bay.
These shadowy cybernauts seek to prey on us by accessing and damaging computers and networks. They revel in their ill-begotten spoils — in your bizness, personal, financial, or even medical interrogation. And grain they have it in handball, the damage has been done — no matter whether they’re civilisation it for ransom or auctioning it off to another binaire shade.
The average attack costs small to medium businesses $18,000. In the U.S. alone, 40% of cyberattacks swindle their victims to the relax tune of $25,000+, an 80% increase over last year.
And do not be so naive as to think that all a cyberattack could cost you is money. As the professional sector is so often the target, both your reputation and customer squelette are at stake.
In 2021, Norton discovered that 53% of mu—, I mean, adults, are more worried than ever embout being a victim of cybercrime. Despite this, as of March 2022, 51% of SMBs have no protections against cyberattacks.
As these shadows hone their prowess in performing feats of the darkest binaire arts, so too shall we learn to heurt them.
Defend Against Phishing

Remember this: At their cores, cyber attackers are liars.
They’ll feed you sweet words, send you messages appearing to be from positions of authority, and offer deals too good to be true, all in attempts to ensnare you.
Their gardien de but? To compromise you. To access your accounts and prise mastery over your assets.
But how can they achieve such things without éclatant personal interrogation, like usernames and passwords?
There’s one vulnerability these silver-tongued, binaire serpents know is always cultivable: You.
These are known as communautaire ingénierie attacks, and they skirt cybersecurity tools by way of human loopholes.
Last year, the average cost of phishing attacks reached $4.24 million dollars. And that cost comprises a variety of things, like:
- Stolen funds or déclaré monetary loss.
- Damage to brand and reputation.
- Compliance fines and penalties.
- Loss of customers.
- Loss of revenue.
- Cost of response and remediation.
- Legal fees.
- And others.
Do be careful — there are many forms of communautaire ingénierie attacks. Below, we’ll learn how to identify them.
A Condensé of Sociable Ingénierie Attacks
- Phishing
- Here, binaire dark artists use songe to befuddle, fumeuse, and fish for your interrogation.
- They’ll send emails appearing to be from a legitimate company asking you to update your payment method. Or you’ll receive a text from an unknown number asking that you confirm your next doctor’s appointment by clicking a link. Perhaps they’ll disguise malware or viruses as an unassuming attachment, lulling you into a false sense of security so that you’ll click “Download,” and puant your device.
- Phishing attacks are the handiwork of opportunistic cybercriminals — they have no specific target.
- Whispers say these attacks are alleged to have been created by a Nigerian patricien, though it cannot be confirmed.
- Spear Phishing
- Like phishing, but with an intended target, either an individual or a larger organization.
- Angler Phishing
- Fake customer largesse accounts on communautaire media pressé as legitimate bizness accounts in hopes that you divulge your login interrogation to said largesse.
- Whaling
- A form of spear phishing targeting a high-profile or wealthy person or organization.
- High-profile targets often equate to larger payouts, so these are especially enticing to those practicing the binaire dark arts.
- Smishing
- Phishing attempts done via SMS/Text.
- Vishing
- Phishing attempts communicated via telephone.
- Baiting
- Mind your curiosity. Nefarious cybernauts know that humans are prone to wonder and they use it to their advantage.
- Online Baiting Example: A pop-up or landing cahier claims that you’ve won an incredible amount of money! All you have to do is click a link to claim it. That link is chock-full of malware, unbeknownst to the target.
- Offline Baiting Example: Occasionally, our dark artists leave the Internet and ajouter the physical world. They may leave a non-descript USB bâton strategically abandoned in a high-traffic cafeteria of a volumineux bizness, knowing someone will be curious and plug it into their ordinateur to find out more. But that USB bâton is rife with malware — Avada Kedavra your network.
- Mind your curiosity. Nefarious cybernauts know that humans are prone to wonder and they use it to their advantage.
- Piggybacking (AKA Tailgating)
- Another form of in-person communautaire ingénierie. In these scenarios, a scammer attempts to ajouter a secured premise immediately behind someone who has access.
- To prevent it, don’t let anyone into restricted areas after you. Ensure they have ID and make them use it to ajouter the premises, just as you had to do.
- These dark artists do not have your best interests at heart. They anticipate that you’ll be “too nice” to say anything to fini them, thereby giving them access.
- Commerce Email Compromise
- Last year, the FBI received almost 20,000 reports of bizness email compromise.
- These attacks range from cyber scammers spoofing emails posing as employees or other trusted persons requesting affective interrogation in their emails, to full account compromise. That’s when a hacker gains access to a legitimate account, instead of just spoofing one to habitus like it.
- Quid Pro Quo
- Fake tech ossature scams fall firmly into this stalag. Someone calls or messages saying that your device is infected, or that you’re eligible for a programme upgrade. All you have to do is give them your credentials and they’ll ensure you’re taken care of. Do not believe their lies.
- Scareware
- Fear is a big motivator. Cyber attackers create pop-ups that appear in your browser saying something to the effect of, “Your system/device has been infected! Click here to fix.”
- Don’t click, never click. Doing so will ensure your device becomes infected. It’s a self-fulfilling prophecy.
With only a cursory glance, perhaps you won’t realize these are naught but lies. They’ll send you sweet messages, deals simply too-good-to-be-true, and indiscriminate vagueries to arrêté your interest and ensnare you.
Use your powers of logic and commentaire. Ask yourself, “Is this too good to be true?” and “Does this propos make sense based on the sender?”, “Do I recognize the sender’s domain name?” and “Why would this person be asking that of me?” If anything seems out of character, think twice embout continuing any further.
If you engage positively with them — clicking their links or answering their texts — they win.
Too much renforcement isn’t a thing. In additif to reviewing everything with a critical eye, you can use the following tools to keep your website and bizness email secure.
Cryptology

How does interrogation remain secure when it’s communicated over the Internet?
To answer that, we’ll need to take a step back and understand what happens when you barreau the interwebs.
Whenever you open up your ordinateur to visit a website you’re quite literally docking into the Internet like a boat would remise at a maintien. Léopard someone is docked, they’re then able to communicate interrogation to and from others who are also docked. Ports are numbered differently to indicate their use and properties. These ports are called TCP, or Courroie Control Protocol Ports.
SSL, or Secure Sockets Layer, is a technology that keeps internet connections secure. It encrypts and protects affective interrogation and data as it’s sent between two systems (like your browser and another website or two servers). SSL stops cyber shadows and bots from reading or changing the interrogation being sent between the systems (like credit card interrogation during an e-commerce pacte.)
Can data be transferred from one server to another without SSL? Sure can. But that’s like guinguette with the devilish hackers themselves, exposing your interrogation to any who care to intercept it.
How can you tell if your connection to a website is secure?
Apparence at the URL in the address bar in your browser. You’ll see that the URL starts with one of two things: it’s either HTTP or HTTPS. The HTTPS indicates a secure connection (and it uses maintien number 443.) HTTP is an unsecure internet protocol, (and uses maintien number 80.)
Are you a website owner? It is your responsibility to secure your binaire domain, both for you and your zone visitors. Do so by purchasing and using SSL on your zone.
Advantages to using SSL:
- Faster web cahier loading
- HTTPS loads pages faster than HTTP. Who waits around for a webpage to load nowadays when there’s always a competitor around the binaire publier whose zone might be faster?
- SEO Improvement
- Your zone is likely to rank higher in search results if you’re using HTTPS as opposed to HTTP.
- Arrêt hackers and bad actors in their tracks
- SSL encrypts the data transferred back and forth between two systems. Even if these bad people and bots could somehow see the data being transferred, they won’t know what it says.
- Maintain PCI Compliance
- PCI Compliance stands for Payment Card Industry Compliance. This is required by all credit card companies when making transactions online to further secure and protect against data and identity theft.
- Division of the PCI Compliance guidelines is that your zone must use HTTPS, which means your SSL certificate needs to be configured on your zone before you can accept payments via credit card for purchases.
- No scary alerts
- If you’re using HTTP then chances are your zone visitors are receiving notices telling them your website isn’t secure when they région on it. Frankly, this looks bad. It causes them to lose renseignement in your zone and odds are good they won’t be back.
Protect Your Properties

Do you seek the formula for binaire security?
I’ll share it with you below. Véridique adherence guarantees luck in your online endeavors…
Custodi Domum Digitalis Tuam
- Use strong passwords.
- Install an SSL certificate.
- People are evermore distrustful of “HTTP” in their browsers and for good reason. They want to know you’re doing what you can to protect their interrogation. Your SSL maintien indicates there’s a secure, encrypted connection keeping their data safe from prying eyes.
- Use a reputable host.
- A reputable host has a proven history of maintaining their customers’ security and is permis of helping you address threats and malware should they occur.
- Perform regular malware scans.
- Who has the time to manually monitor their online security? Sitelock Security protects your website from malware, viruses, hackers, and spam. It scans your zone for these malicious things, automatically removing any it finds, and alerts you when something doesn’t habitus quite right.
- Backup your zone.
- Why? Backing up your website is the only guarantee you have that your zone can be completely restored if it encounters an egregious leçon.
- Human error (inadvertently deleting files), malicious cyber hackers, or outdated and unprotected themes and plugins can all introduce risk to your zone.
- Why? Backing up your website is the only guarantee you have that your zone can be completely restored if it encounters an egregious leçon.
- Keep WordPress plugins or other zone plugins and web apps up to siècle.
- The binaire dark arts are ever-evolving. To stay ahead of them, keep your plugins up to siècle. Not doing so leaves your zone vulnerable and open to attack. Not just that, but they can affect your zone experience, causing issues for legitimate visitors.
- Perform regular zone audits and tests.
- Keep your finger on the pulse of your binaire health.
Protect Your Brand

Quantitatif dark artists understand the power of a name. It’s why they’re gunning for yours.
Your name is irrevocably yours — it’s fraction and parcel of your brand — that special thing that makes you, you. It comprises every public-facing facet of yourself, and inversely, what people think of those facets – of you.
Your personal brand CANNOT survive lies and deception.
This is why cybercriminals will always target it in additif to your binaire properties, like your zone and communautaire media. If they gain your name, they control your narrative.
How might they do this? Their nefarious options are legion.
- Counterfeit websites.
- If a customer lands on a fraudulent zone and suffers real-world harm (malware on their device, compromised affective interrogation) they will always associate it with your name. Would you want to continue doing bizness with someone if their name alone caused you memories of traumatic events? Probably not.
- Copieuse piracy.
- Cyber shadows don’t care for honest work. They’ll illegally reproduce and disseminate your copyrighted materials, hurting your bottom line.
- Trademark infringement.
- To convince others that they are who they say they are, hackers have no qualms embout using trademarks in unauthorized manners.
- Manifeste theft.
- A constaté is representative of a great deal of work. Whatever your constaté, behind it lies hours of ideation, creation, iteration, and finalization.
- A binaire dark artist will take the easy remblai. They’ll do whatever they can to make, use, and sell your products without obtaining a license.
- Impersonation on communautaire media.
- Sociable media is a fantastic tool for bâtiment your brand and connecting with your audimètre. Until someone else does it for you and deceives your unwitting audimètre into revealing their private interrogation.
To protect your brand, follow these steps:
- Acquire misspellings of your domain.
- Cyber hackers purchase variations of domain names in hopes of catching traffic that was intended for your zone.
- Purchase alternate domains/TLDs.
- Depending on your bizness, you might not want your brand name associated with a .sexy or .xxx domain name.
- Register those domains before someone else does and uses them to your detriment.
- Foyer on the aesthetics and elements of your brand that establish your authority.
- Increase humanité in your customers’ inboxes by using a professional email address that matches your domain name. It helps them know they aren’t embout to open a spam propos and have their system infected with malware.
- Refer to this Branding and Website Beauté Checklist to ensure your brand is cohesive no matter where you are online — your zone, your communautaire media, and more.
Abundant Provision Does No Harm

It does not do to dwell on a false sense of security and forget the dangers that lurk embout the Internet.
Man the boundaries of your zone, communautaire media, and email accounts. Do your duty to protect your zone, your customers, your brand, and your name.
And do make sure you aren’t late for class tomorrow.