SlideShare a Scribd company logo
MAY 2021 ISSUE 21
MAINTAINING YOUR DIGITAL PRIVACY
OMNIRISC SECURITY NEWSLETTER
In this newsletter we have a change of topic for you, with our focus shifted from physical security to cyber
security. The convergence of information and cyber security is highly relevant to your reputational and
financial concerns. Applying a combination of physical and cyber security to your requirements will
strengthen your overall security profile and resilience to risk.
If you are like us, being cautious or even paranoid about our security concerns, you will take extensive
steps to ensure that your personal digital security is maintained. These include securing your
communications, personal data, credentials, banking details, web browsing activities and of course your
online privacy. In this article, we will discuss ways to protect your digital security and privacy as an
individual though they are equally suited for small businesses as well.
Digital Privacy
2021 is the age of digital surveillance when
everything we do digitally and online is recorded
and archived somewhere unknown to us. This is
not a conspiracy theory but fact. We already know
there are various extensive government
surveillance programs in place, but over and above
Due Diligence
It is common practice in some industries to
conduct a thorough investigation into any
potential new hires, partners, investors or
competitors. The most common investigation
method is OSINT (open-source intelligence)
operations.
the obvious privacy challenges that these programs
present are a whole range of other reasons why we
should proactively maintain our digital privacy.
Data brokers, who gather any and all data we
unknowingly leave behind on the internet, present
an ongoing challenge to our digital privacy. Think
about the countless cookies and trackers that most
websites have embedded in them these
days. They can track all our activities when we are
on and even off the particular site. Our data is
collected by the data brokers who then sell that
data (or classifications made based on that data) to
other data brokers, companies or interested parties.
Data brokers never make themselves known to the
people they're collecting data on, so we will never
even know who has access to our personal
information.
To learn more about data brokers read this
excellent article on the subject.
In addition to the data brokers who want to profit
from our data and governments who want to
Open-source intelligence is a methodology for
collecting data from publicly available sources
and analysing in an intelligence or investigative
context. OSINT has been proven to be extremely
effective when conducted against individuals or
organizations who have not taken any steps to
maintain their digital privacy.
For example, if we want to know everything about
your business without you knowing it, we would
gather OSINT on you, your key people and the
organization as a whole. This would include an
exhaustive gathering of data from social media
profiles on LinkedIn, Facebook and others, and
publicly available data like criminal records,
property records and other such archives. Files
would be built on your key people, their
preferences, habits, former employment and
anything else that can be found.
Corporate and personal blogs, including old
archived and deleted blog posts, would be
reviewed. Anything that the targets of an OSINT
investigation have ever touched online will
eventually be found if they have made no real
effort to conceal their activities. With a small
budget, an OSINT investigation can be
supplemented with information bought from data
brokers to paint a comprehensive picture of you,
your key people and your organization. Such
information can include aliases, birthdates,
interests and affiliations, current and previous
addresses, academic background, employment
details, marital status and relationships, financial
conditions, social media profiles, property
records, and even your relatives.
You would be shocked if you ever saw a
comprehensive intelligence analysis report on
monitor our online activities, you should also watch
out for those who decide to investigate you and
your company for whatever reason.
yourself, especially if it was drawn up by an
expert with detailed psychological profiling
and a list of your frequently visited locations
obtained from your smartphone GPS.
Protecting Your Digital Privacy
Now that we have “framed the picture” for you,
hopefully you can be motivated and realize it is
time to start protecting your digital privacy. So
let's start with your communications infrastructure
and online footprint.
Encrypt Your Email - Stop using Gmail or Office
365 as your personal and professional email
hosting provider. Anything and everything you
type will be mined by either companies and both
have arrangements with different law
enforcement and intelligence agencies. In short,
your emails are an open book. A far safer
alternative would be ProtonMail. The developer
is based in Switzerland where some of the
world’s strongest digital privacy protections are
enshrined in their law. Their state-of-the-art
technology allows you to simply encrypt your
emails. You can use your own custom domains
for your email address. By default, anything any
employee in your organization sends to one
another will be encrypted. It is easy to also
encrypt emails you send to people outside of
your organization.
Encrypting your emails is a vital first step to
protecting your digital privacy and ensuring that
no third party will ever have access to them,
either in transit or at rest.
Encrypt Your IM/Voice
If you are currently using IM applications like
WhatsApp, FB Messenger or similar then you’d
better stop. Just like email hosting providers, these
applications are mined for data. Your messages
are obtainable via court orders should the
authorities want to read them. It is far more secure
to use a privacy orientated IM application
like Signal or Threema. We
recommend Threema for the the same reason as
ProtonMail because it is based in Switzerland. It
does not require a phone number to sign up for use
nor requires synchronisation of contacts, which is
essential for protecting the identity of you and your
contacts.
As a rule, any voice or text-based conversation
that you want to keep anonymous should be done
on these encrypted platforms to retain your
digital privacy.
Use Different Devices
Many of us use the same device for personal and
Secure Your Online Activity
If you are currently using browsers like Chrome
or Edge, then you should stop and assume that
everything you have done on these browsers has
been tracked and recorded.
A more secure alternative, one that contains a
whole host of privacy options, is Mozilla
Firefox. Firefox is an open source browser with a
very good track record regarding user privacy
protection. For a bit of fun, once you have
installed Firefox, test it with the Panopticlick
service from the Electronic Frontier Foundation, it
will tell you how trackable your browser is. You
can compare the results when you test again
after the following steps.
Make sure you secure your Firefox browsing
by configuring the privacy settings properly and
then installing privacy plugins
like NoScript, PrivacyBadger, CookieAutoDelete
and HTTPSeverywhere. It is worth spending a
little time familiarizing yourself with these plugins
and understanding how they protect you from
tracking cookies, pixels, code and anything else
that wants to monitor your online activities.
If you really want to surf the internet in a
completely anonymous way, use browsers
like TorBrowser, to completely dissociate and
isolate your web-browsing from your local
device. This is by far the best way to avoid being
professional affairs out of convenience, but such
convenience could potentially hurt your
privacy. By completely separating your
professional and personal affairs with different
devices, then if a hacker infiltrates one of your
devices, he/she does not have the keys to the
rest of your life. Segmentation of tasks between
devices will help you maintain your digital
privacy. If you are especially paranoid about
privacy, use one set of devices for work and
another set for your private life. Placing a
physical air-gap between them gives you the
ability to lock them down individually.
If you can only use just one laptop or phone, at
the very least use a remote browser for web-
browsing, or install a virtual machine using the
open-source VirtualBox hypervisor. It will let you
setup a virtually separate version of Windows OS
(or any other operating system) on the same
machine. Then you can use that virtual machine
for professional affairs, encrypt and lock it down
properly when you are done. You can then shift
to use the same machine for personal matters.
Check out this interesting article of Hackers
Breach Thousands of Security Cameras,
Exposing Tesla, Jails, Hospitals.
Similarly, how are gaming businesses in Macau
prepared to secure their IT infrastructure in
case of a breach. Can hackers extract the
usernames and passwords of security camera
and take complete control? If you decide
today to take the first step in securing your
digital privacy, it will make it a lot harder for
anyone to gather data on you and use it against
you or your business.
tracked through your browser.
How can OMNIRISC assist you...
If you have any questions or wish to perform a
thorough vulnerability and penetration test to
secure your organization from cyberattacks or the
like, please do let us know by email
to info@omnirisc.com
Guise Bule is the founder of secjuice, a non-profit and volunteer-led private members writing club focused on
cybersecurity, information security, network security, social engineering and open source intelligence
(OSINT). He is also the co-founder of WEBGAP, a remote browser isolation cybersecurity start up focused on
cyber defence.
Copyright ©2021, OMNIRISC SECURITY SERVCE (MACAO) LTD, All rights reserved.
26 Avenida De Marciano Baptista
Chong Fok Comercial Centre, 13/H, Macau
Our mailing address is:
info@omnirisc.com
Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

More Related Content

What's hot

StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
Stuart Millar
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12
Sustainly
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
ERPScan
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
AnonDownload
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
eBoost Consulting
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
Ulf Mattsson
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
Labris Networks
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
Stephen Richards
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
InMobi Technology
 
Ssl tls-beginners-guide
Ssl tls-beginners-guideSsl tls-beginners-guide
Ssl tls-beginners-guide
JosephLamineDIALLO
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
David Hunt
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 

What's hot (20)

StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Data breach
Data breachData breach
Data breach
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Ssl tls-beginners-guide
Ssl tls-beginners-guideSsl tls-beginners-guide
Ssl tls-beginners-guide
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 

Similar to Cyber security macau

Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
antoniokisembo
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
RajviNikeetaRathore
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Muhammad Khan
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
wrathfulplaza6959
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
exultantwarning51
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Cyber Security
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
MoizAhmed398372
 

Similar to Cyber security macau (20)

Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Users guide
Users guideUsers guide
Users guide
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 

Recently uploaded

Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
ownerdetailssim
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
Outdoor Home Decor Company
 
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral BookletThe Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
rajkintex
 
Findlay Evans Waterproofing with AIW - Article July 2019
Findlay Evans Waterproofing with AIW - Article July 2019Findlay Evans Waterproofing with AIW - Article July 2019
Findlay Evans Waterproofing with AIW - Article July 2019
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
zeunw
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
John McHale
 
Check CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details CheckerCheck CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details Checker
ownerdetailssim
 
How our Rebranding Succeeds in Instilling trust in Every Agri Citizen
How our Rebranding Succeeds in Instilling trust in Every Agri CitizenHow our Rebranding Succeeds in Instilling trust in Every Agri Citizen
How our Rebranding Succeeds in Instilling trust in Every Agri Citizen
Ninja Cart
 
OpenText Vulnerability Assessment & Penetration Testing
OpenText Vulnerability Assessment & Penetration TestingOpenText Vulnerability Assessment & Penetration Testing
OpenText Vulnerability Assessment & Penetration Testing
Marc St-Pierre
 
Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
usaisofficial
 
Unification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service ProviderUnification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service Provider
shikhaseo43
 
Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
Foresic Academy. Information Security Company in Punjab (INDIA)
Foresic Academy. Information  Security Company in Punjab (INDIA)Foresic Academy. Information  Security Company in Punjab (INDIA)
Foresic Academy. Information Security Company in Punjab (INDIA)
Forensic Academy
 
Findlay Evans Waterproofing with AIW - Article November 2017
Findlay Evans Waterproofing with AIW - Article November 2017Findlay Evans Waterproofing with AIW - Article November 2017
Findlay Evans Waterproofing with AIW - Article November 2017
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........
lilya092000
 
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdfPEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
EMk Termite Pest
 
9861615390 Satta Dpboss Satta Matka Satta
9861615390 Satta Dpboss Satta Matka Satta9861615390 Satta Dpboss Satta Matka Satta
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
Alexa Bale
 

Recently uploaded (20)

Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
 
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral BookletThe Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
 
Findlay Evans Waterproofing with AIW - Article July 2019
Findlay Evans Waterproofing with AIW - Article July 2019Findlay Evans Waterproofing with AIW - Article July 2019
Findlay Evans Waterproofing with AIW - Article July 2019
 
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
一比一原版(UIUC毕业证)UIUC毕业证香槟分校毕业证如何办理
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
 
Check CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details CheckerCheck CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details Checker
 
How our Rebranding Succeeds in Instilling trust in Every Agri Citizen
How our Rebranding Succeeds in Instilling trust in Every Agri CitizenHow our Rebranding Succeeds in Instilling trust in Every Agri Citizen
How our Rebranding Succeeds in Instilling trust in Every Agri Citizen
 
OpenText Vulnerability Assessment & Penetration Testing
OpenText Vulnerability Assessment & Penetration TestingOpenText Vulnerability Assessment & Penetration Testing
OpenText Vulnerability Assessment & Penetration Testing
 
Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
 
Unification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service ProviderUnification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service Provider
 
Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019
 
Foresic Academy. Information Security Company in Punjab (INDIA)
Foresic Academy. Information  Security Company in Punjab (INDIA)Foresic Academy. Information  Security Company in Punjab (INDIA)
Foresic Academy. Information Security Company in Punjab (INDIA)
 
Findlay Evans Waterproofing with AIW - Article November 2017
Findlay Evans Waterproofing with AIW - Article November 2017Findlay Evans Waterproofing with AIW - Article November 2017
Findlay Evans Waterproofing with AIW - Article November 2017
 
QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........
 
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdfPEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
 
9861615390 Satta Dpboss Satta Matka Satta
9861615390 Satta Dpboss Satta Matka Satta9861615390 Satta Dpboss Satta Matka Satta
9861615390 Satta Dpboss Satta Matka Satta
 
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
 

Cyber security macau

  • 1. MAY 2021 ISSUE 21 MAINTAINING YOUR DIGITAL PRIVACY OMNIRISC SECURITY NEWSLETTER In this newsletter we have a change of topic for you, with our focus shifted from physical security to cyber security. The convergence of information and cyber security is highly relevant to your reputational and financial concerns. Applying a combination of physical and cyber security to your requirements will strengthen your overall security profile and resilience to risk. If you are like us, being cautious or even paranoid about our security concerns, you will take extensive steps to ensure that your personal digital security is maintained. These include securing your communications, personal data, credentials, banking details, web browsing activities and of course your online privacy. In this article, we will discuss ways to protect your digital security and privacy as an individual though they are equally suited for small businesses as well. Digital Privacy 2021 is the age of digital surveillance when everything we do digitally and online is recorded and archived somewhere unknown to us. This is not a conspiracy theory but fact. We already know there are various extensive government surveillance programs in place, but over and above Due Diligence It is common practice in some industries to conduct a thorough investigation into any potential new hires, partners, investors or competitors. The most common investigation method is OSINT (open-source intelligence) operations.
  • 2. the obvious privacy challenges that these programs present are a whole range of other reasons why we should proactively maintain our digital privacy. Data brokers, who gather any and all data we unknowingly leave behind on the internet, present an ongoing challenge to our digital privacy. Think about the countless cookies and trackers that most websites have embedded in them these days. They can track all our activities when we are on and even off the particular site. Our data is collected by the data brokers who then sell that data (or classifications made based on that data) to other data brokers, companies or interested parties. Data brokers never make themselves known to the people they're collecting data on, so we will never even know who has access to our personal information. To learn more about data brokers read this excellent article on the subject. In addition to the data brokers who want to profit from our data and governments who want to Open-source intelligence is a methodology for collecting data from publicly available sources and analysing in an intelligence or investigative context. OSINT has been proven to be extremely effective when conducted against individuals or organizations who have not taken any steps to maintain their digital privacy. For example, if we want to know everything about your business without you knowing it, we would gather OSINT on you, your key people and the organization as a whole. This would include an exhaustive gathering of data from social media profiles on LinkedIn, Facebook and others, and publicly available data like criminal records, property records and other such archives. Files would be built on your key people, their preferences, habits, former employment and anything else that can be found. Corporate and personal blogs, including old archived and deleted blog posts, would be reviewed. Anything that the targets of an OSINT investigation have ever touched online will eventually be found if they have made no real effort to conceal their activities. With a small budget, an OSINT investigation can be supplemented with information bought from data brokers to paint a comprehensive picture of you, your key people and your organization. Such information can include aliases, birthdates, interests and affiliations, current and previous addresses, academic background, employment details, marital status and relationships, financial conditions, social media profiles, property records, and even your relatives. You would be shocked if you ever saw a comprehensive intelligence analysis report on
  • 3. monitor our online activities, you should also watch out for those who decide to investigate you and your company for whatever reason. yourself, especially if it was drawn up by an expert with detailed psychological profiling and a list of your frequently visited locations obtained from your smartphone GPS. Protecting Your Digital Privacy Now that we have “framed the picture” for you, hopefully you can be motivated and realize it is time to start protecting your digital privacy. So let's start with your communications infrastructure and online footprint. Encrypt Your Email - Stop using Gmail or Office 365 as your personal and professional email hosting provider. Anything and everything you type will be mined by either companies and both have arrangements with different law enforcement and intelligence agencies. In short, your emails are an open book. A far safer alternative would be ProtonMail. The developer is based in Switzerland where some of the world’s strongest digital privacy protections are enshrined in their law. Their state-of-the-art technology allows you to simply encrypt your emails. You can use your own custom domains for your email address. By default, anything any employee in your organization sends to one another will be encrypted. It is easy to also encrypt emails you send to people outside of your organization. Encrypting your emails is a vital first step to protecting your digital privacy and ensuring that no third party will ever have access to them, either in transit or at rest. Encrypt Your IM/Voice If you are currently using IM applications like WhatsApp, FB Messenger or similar then you’d better stop. Just like email hosting providers, these applications are mined for data. Your messages are obtainable via court orders should the authorities want to read them. It is far more secure to use a privacy orientated IM application like Signal or Threema. We recommend Threema for the the same reason as ProtonMail because it is based in Switzerland. It does not require a phone number to sign up for use nor requires synchronisation of contacts, which is essential for protecting the identity of you and your contacts. As a rule, any voice or text-based conversation that you want to keep anonymous should be done on these encrypted platforms to retain your digital privacy. Use Different Devices Many of us use the same device for personal and
  • 4. Secure Your Online Activity If you are currently using browsers like Chrome or Edge, then you should stop and assume that everything you have done on these browsers has been tracked and recorded. A more secure alternative, one that contains a whole host of privacy options, is Mozilla Firefox. Firefox is an open source browser with a very good track record regarding user privacy protection. For a bit of fun, once you have installed Firefox, test it with the Panopticlick service from the Electronic Frontier Foundation, it will tell you how trackable your browser is. You can compare the results when you test again after the following steps. Make sure you secure your Firefox browsing by configuring the privacy settings properly and then installing privacy plugins like NoScript, PrivacyBadger, CookieAutoDelete and HTTPSeverywhere. It is worth spending a little time familiarizing yourself with these plugins and understanding how they protect you from tracking cookies, pixels, code and anything else that wants to monitor your online activities. If you really want to surf the internet in a completely anonymous way, use browsers like TorBrowser, to completely dissociate and isolate your web-browsing from your local device. This is by far the best way to avoid being professional affairs out of convenience, but such convenience could potentially hurt your privacy. By completely separating your professional and personal affairs with different devices, then if a hacker infiltrates one of your devices, he/she does not have the keys to the rest of your life. Segmentation of tasks between devices will help you maintain your digital privacy. If you are especially paranoid about privacy, use one set of devices for work and another set for your private life. Placing a physical air-gap between them gives you the ability to lock them down individually. If you can only use just one laptop or phone, at the very least use a remote browser for web- browsing, or install a virtual machine using the open-source VirtualBox hypervisor. It will let you setup a virtually separate version of Windows OS (or any other operating system) on the same machine. Then you can use that virtual machine for professional affairs, encrypt and lock it down properly when you are done. You can then shift to use the same machine for personal matters. Check out this interesting article of Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals. Similarly, how are gaming businesses in Macau prepared to secure their IT infrastructure in case of a breach. Can hackers extract the usernames and passwords of security camera and take complete control? If you decide today to take the first step in securing your digital privacy, it will make it a lot harder for anyone to gather data on you and use it against you or your business.
  • 5. tracked through your browser. How can OMNIRISC assist you... If you have any questions or wish to perform a thorough vulnerability and penetration test to secure your organization from cyberattacks or the like, please do let us know by email to info@omnirisc.com Guise Bule is the founder of secjuice, a non-profit and volunteer-led private members writing club focused on cybersecurity, information security, network security, social engineering and open source intelligence (OSINT). He is also the co-founder of WEBGAP, a remote browser isolation cybersecurity start up focused on cyber defence. Copyright ©2021, OMNIRISC SECURITY SERVCE (MACAO) LTD, All rights reserved. 26 Avenida De Marciano Baptista Chong Fok Comercial Centre, 13/H, Macau Our mailing address is: info@omnirisc.com Want to change how you receive these emails? You can update your preferences or unsubscribe from this list.