SlideShare a Scribd company logo
1 of 2
Download to read offline
Cyber security for influencers – Why people in public life
need to protect themselves from threats
Cyber security is a topic that, even in 2023, far too few individuals,
influencers and companies are addressing. Often, the problem is that the
added value of the expenditure is not seen and thus budget flows into
something that is considered “not mandatory” in the first instance. Looking
at a study conducted by KPMG in 2022, this approach is simply wrong. 67%
of the Austrian companies surveyed were victims of a cyberattack in the
last 12 months. This led to financial damage for some, which can also be
existentially threatening. Influencers are unfortunately not protected from
this and are equally affected as companies. But why are social media
personalities at risk and how can they effectively be protected?
Consider influencers as a normal
business
Influencers, or public figures in general, shouldn’t be viewed any
differently than a company. Because although it often seems like only one
person is acting, that’s usually only the case with nano and micro
influencers. All other groups usually have support in pretty much all areas,
as they simply have a too large follower base. If you compare a company
and their size with the amount of followers of an influencer, you can very
quickly see a correlation when it comes to the attack surface. The more
users follow, the more staff is needed and the risk increases. In addition to
this, there is also the generated interest. While a classic company,
individually considered, is not in the public eye, they are more likely to be
selected by hackers based on sales/profit or by accident. While this is also
true for public figures, individual individuals might additionally have a
personal interest. This poses great dangers, because it is still possible to
infiltrate any system. The only question is how great the interest is and how
much time it takes.
Major impact
What happens in a cyber attack on a traditional company is seen every
day. But you can also find enough information about influencers, streamers
and general social media personalities. For example, in April 2022,
the Youtuber Julien Bam was successfully hacked and his YouTube and
Instagram channels were taken over. The consequences in this case? The
sustained loss of followers, a significant loss of trust and financial damage.
None of this would have been necessary, considering the attack path. At
that time, it seems that a classic phishing email was responsible for the
infection of a single PC. Any password or authentication with MFA, no
matter how strong, is irrelevant here because the user was already logged
on to the PC. But a simple EDR solution with monitoring, for around 150€ a
year, could have prevented this. To expand this, we would also
suggest phishing tests with suitable software to sufficiently sensibilize the
employees.
Read more ……

More Related Content

Similar to Zetta.pdf

Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Managementtwhiteman
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016James_08
 
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...Clive Maclean
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfEnterprise Insider
 
Impact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance RiskImpact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance RiskSam Gibbins 紀俊森
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
 
Mapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media RiskMapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media Risk- Mark - Fullbright
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk ManagementUzzi Ohana
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...Altimeter, a Prophet Company
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 

Similar to Zetta.pdf (20)

Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Management
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...
Rx For Agencies Suffereing From Digital, Direct, PR, And Social Media Confusi...
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
Impact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance RiskImpact of Social & Digital Media on Legal & Compliance Risk
Impact of Social & Digital Media on Legal & Compliance Risk
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
Mapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media RiskMapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media Risk
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Risky Business
Risky BusinessRisky Business
Risky Business
 

More from RonDosh

TailwindCSS Empty State - (Pure Code AI)
TailwindCSS Empty State - (Pure Code AI)TailwindCSS Empty State - (Pure Code AI)
TailwindCSS Empty State - (Pure Code AI)RonDosh
 
How to Use Material UI Tooltip Component Like a Pro
How to Use Material UI Tooltip Component Like a ProHow to Use Material UI Tooltip Component Like a Pro
How to Use Material UI Tooltip Component Like a ProRonDosh
 
How to Use Tailwind Config to Customize Theme Styles
How to Use Tailwind Config to Customize Theme StylesHow to Use Tailwind Config to Customize Theme Styles
How to Use Tailwind Config to Customize Theme StylesRonDosh
 
Tailwind Animation: How to Make Eye-Catching Websites
Tailwind Animation: How to Make Eye-Catching WebsitesTailwind Animation: How to Make Eye-Catching Websites
Tailwind Animation: How to Make Eye-Catching WebsitesRonDosh
 
How to Implement a Navigation MUI Drawer in Your React App
How to Implement a Navigation MUI Drawer in Your React AppHow to Implement a Navigation MUI Drawer in Your React App
How to Implement a Navigation MUI Drawer in Your React AppRonDosh
 
A Guide to Creating a Great Custom Tailwind Sidebar
A Guide to Creating a Great Custom Tailwind SidebarA Guide to Creating a Great Custom Tailwind Sidebar
A Guide to Creating a Great Custom Tailwind SidebarRonDosh
 
Tailwind Carousel: Create Responsive Carousels Easily - Blogs
Tailwind Carousel: Create Responsive Carousels Easily - BlogsTailwind Carousel: Create Responsive Carousels Easily - Blogs
Tailwind Carousel: Create Responsive Carousels Easily - BlogsRonDosh
 
Creating a Great Navigation Bar with MUI AppBar Component - Blogs
Creating a Great Navigation Bar with MUI AppBar Component - BlogsCreating a Great Navigation Bar with MUI AppBar Component - Blogs
Creating a Great Navigation Bar with MUI AppBar Component - BlogsRonDosh
 
Use Tailwind Select for Easy and Reliable Dropdowns - Blogs
Use Tailwind Select for Easy and Reliable Dropdowns - BlogsUse Tailwind Select for Easy and Reliable Dropdowns - Blogs
Use Tailwind Select for Easy and Reliable Dropdowns - BlogsRonDosh
 
Using Tailwind Shadow: An Easy Guide to Custom Shadows - Blogs
Using Tailwind Shadow: An Easy Guide to Custom Shadows - BlogsUsing Tailwind Shadow: An Easy Guide to Custom Shadows - Blogs
Using Tailwind Shadow: An Easy Guide to Custom Shadows - BlogsRonDosh
 
Explore the Tailwind Hidden Utility for Great Design Control - Blogs
Explore the Tailwind Hidden Utility for Great Design Control - BlogsExplore the Tailwind Hidden Utility for Great Design Control - Blogs
Explore the Tailwind Hidden Utility for Great Design Control - BlogsRonDosh
 
Top 20+ React Website Templates: Free and Premium Themes - Blogs
Top 20+ React Website Templates: Free and Premium Themes - BlogsTop 20+ React Website Templates: Free and Premium Themes - Blogs
Top 20+ React Website Templates: Free and Premium Themes - BlogsRonDosh
 
CSS Disable Button - How to Disable Buttons Using CSS - Blogs
CSS Disable Button - How to Disable Buttons Using CSS - BlogsCSS Disable Button - How to Disable Buttons Using CSS - Blogs
CSS Disable Button - How to Disable Buttons Using CSS - BlogsRonDosh
 
Make the Most of the MUI Dialog Component in React.pdf
Make the Most of the MUI Dialog Component in React.pdfMake the Most of the MUI Dialog Component in React.pdf
Make the Most of the MUI Dialog Component in React.pdfRonDosh
 
Tailwind Templates How to Find the Perfect Template.pdf
Tailwind Templates How to Find the Perfect Template.pdfTailwind Templates How to Find the Perfect Template.pdf
Tailwind Templates How to Find the Perfect Template.pdfRonDosh
 
Create Stunning Tailwind Gradient Text Easily.pdf
Create Stunning Tailwind Gradient Text Easily.pdfCreate Stunning Tailwind Gradient Text Easily.pdf
Create Stunning Tailwind Gradient Text Easily.pdfRonDosh
 
Unlock the Power of MUI Colors How to Create Color Palettes.pdf
Unlock the Power of MUI Colors How to Create Color Palettes.pdfUnlock the Power of MUI Colors How to Create Color Palettes.pdf
Unlock the Power of MUI Colors How to Create Color Palettes.pdfRonDosh
 
Unlock the Power of Mui Breakpoints and Make Great Projects.pdf
Unlock the Power of Mui Breakpoints and Make Great Projects.pdfUnlock the Power of Mui Breakpoints and Make Great Projects.pdf
Unlock the Power of Mui Breakpoints and Make Great Projects.pdfRonDosh
 
How to Create Sleek MUI Chip Components.pdf
How to Create Sleek MUI Chip Components.pdfHow to Create Sleek MUI Chip Components.pdf
How to Create Sleek MUI Chip Components.pdfRonDosh
 
MUI Modal Make Your Web Application More Powerful.pdf
MUI Modal Make Your Web Application More Powerful.pdfMUI Modal Make Your Web Application More Powerful.pdf
MUI Modal Make Your Web Application More Powerful.pdfRonDosh
 

More from RonDosh (20)

TailwindCSS Empty State - (Pure Code AI)
TailwindCSS Empty State - (Pure Code AI)TailwindCSS Empty State - (Pure Code AI)
TailwindCSS Empty State - (Pure Code AI)
 
How to Use Material UI Tooltip Component Like a Pro
How to Use Material UI Tooltip Component Like a ProHow to Use Material UI Tooltip Component Like a Pro
How to Use Material UI Tooltip Component Like a Pro
 
How to Use Tailwind Config to Customize Theme Styles
How to Use Tailwind Config to Customize Theme StylesHow to Use Tailwind Config to Customize Theme Styles
How to Use Tailwind Config to Customize Theme Styles
 
Tailwind Animation: How to Make Eye-Catching Websites
Tailwind Animation: How to Make Eye-Catching WebsitesTailwind Animation: How to Make Eye-Catching Websites
Tailwind Animation: How to Make Eye-Catching Websites
 
How to Implement a Navigation MUI Drawer in Your React App
How to Implement a Navigation MUI Drawer in Your React AppHow to Implement a Navigation MUI Drawer in Your React App
How to Implement a Navigation MUI Drawer in Your React App
 
A Guide to Creating a Great Custom Tailwind Sidebar
A Guide to Creating a Great Custom Tailwind SidebarA Guide to Creating a Great Custom Tailwind Sidebar
A Guide to Creating a Great Custom Tailwind Sidebar
 
Tailwind Carousel: Create Responsive Carousels Easily - Blogs
Tailwind Carousel: Create Responsive Carousels Easily - BlogsTailwind Carousel: Create Responsive Carousels Easily - Blogs
Tailwind Carousel: Create Responsive Carousels Easily - Blogs
 
Creating a Great Navigation Bar with MUI AppBar Component - Blogs
Creating a Great Navigation Bar with MUI AppBar Component - BlogsCreating a Great Navigation Bar with MUI AppBar Component - Blogs
Creating a Great Navigation Bar with MUI AppBar Component - Blogs
 
Use Tailwind Select for Easy and Reliable Dropdowns - Blogs
Use Tailwind Select for Easy and Reliable Dropdowns - BlogsUse Tailwind Select for Easy and Reliable Dropdowns - Blogs
Use Tailwind Select for Easy and Reliable Dropdowns - Blogs
 
Using Tailwind Shadow: An Easy Guide to Custom Shadows - Blogs
Using Tailwind Shadow: An Easy Guide to Custom Shadows - BlogsUsing Tailwind Shadow: An Easy Guide to Custom Shadows - Blogs
Using Tailwind Shadow: An Easy Guide to Custom Shadows - Blogs
 
Explore the Tailwind Hidden Utility for Great Design Control - Blogs
Explore the Tailwind Hidden Utility for Great Design Control - BlogsExplore the Tailwind Hidden Utility for Great Design Control - Blogs
Explore the Tailwind Hidden Utility for Great Design Control - Blogs
 
Top 20+ React Website Templates: Free and Premium Themes - Blogs
Top 20+ React Website Templates: Free and Premium Themes - BlogsTop 20+ React Website Templates: Free and Premium Themes - Blogs
Top 20+ React Website Templates: Free and Premium Themes - Blogs
 
CSS Disable Button - How to Disable Buttons Using CSS - Blogs
CSS Disable Button - How to Disable Buttons Using CSS - BlogsCSS Disable Button - How to Disable Buttons Using CSS - Blogs
CSS Disable Button - How to Disable Buttons Using CSS - Blogs
 
Make the Most of the MUI Dialog Component in React.pdf
Make the Most of the MUI Dialog Component in React.pdfMake the Most of the MUI Dialog Component in React.pdf
Make the Most of the MUI Dialog Component in React.pdf
 
Tailwind Templates How to Find the Perfect Template.pdf
Tailwind Templates How to Find the Perfect Template.pdfTailwind Templates How to Find the Perfect Template.pdf
Tailwind Templates How to Find the Perfect Template.pdf
 
Create Stunning Tailwind Gradient Text Easily.pdf
Create Stunning Tailwind Gradient Text Easily.pdfCreate Stunning Tailwind Gradient Text Easily.pdf
Create Stunning Tailwind Gradient Text Easily.pdf
 
Unlock the Power of MUI Colors How to Create Color Palettes.pdf
Unlock the Power of MUI Colors How to Create Color Palettes.pdfUnlock the Power of MUI Colors How to Create Color Palettes.pdf
Unlock the Power of MUI Colors How to Create Color Palettes.pdf
 
Unlock the Power of Mui Breakpoints and Make Great Projects.pdf
Unlock the Power of Mui Breakpoints and Make Great Projects.pdfUnlock the Power of Mui Breakpoints and Make Great Projects.pdf
Unlock the Power of Mui Breakpoints and Make Great Projects.pdf
 
How to Create Sleek MUI Chip Components.pdf
How to Create Sleek MUI Chip Components.pdfHow to Create Sleek MUI Chip Components.pdf
How to Create Sleek MUI Chip Components.pdf
 
MUI Modal Make Your Web Application More Powerful.pdf
MUI Modal Make Your Web Application More Powerful.pdfMUI Modal Make Your Web Application More Powerful.pdf
MUI Modal Make Your Web Application More Powerful.pdf
 

Recently uploaded

best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 

Recently uploaded (20)

best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 

Zetta.pdf

  • 1. Cyber security for influencers – Why people in public life need to protect themselves from threats Cyber security is a topic that, even in 2023, far too few individuals, influencers and companies are addressing. Often, the problem is that the added value of the expenditure is not seen and thus budget flows into something that is considered “not mandatory” in the first instance. Looking at a study conducted by KPMG in 2022, this approach is simply wrong. 67% of the Austrian companies surveyed were victims of a cyberattack in the last 12 months. This led to financial damage for some, which can also be existentially threatening. Influencers are unfortunately not protected from this and are equally affected as companies. But why are social media personalities at risk and how can they effectively be protected? Consider influencers as a normal business Influencers, or public figures in general, shouldn’t be viewed any differently than a company. Because although it often seems like only one person is acting, that’s usually only the case with nano and micro
  • 2. influencers. All other groups usually have support in pretty much all areas, as they simply have a too large follower base. If you compare a company and their size with the amount of followers of an influencer, you can very quickly see a correlation when it comes to the attack surface. The more users follow, the more staff is needed and the risk increases. In addition to this, there is also the generated interest. While a classic company, individually considered, is not in the public eye, they are more likely to be selected by hackers based on sales/profit or by accident. While this is also true for public figures, individual individuals might additionally have a personal interest. This poses great dangers, because it is still possible to infiltrate any system. The only question is how great the interest is and how much time it takes. Major impact What happens in a cyber attack on a traditional company is seen every day. But you can also find enough information about influencers, streamers and general social media personalities. For example, in April 2022, the Youtuber Julien Bam was successfully hacked and his YouTube and Instagram channels were taken over. The consequences in this case? The sustained loss of followers, a significant loss of trust and financial damage. None of this would have been necessary, considering the attack path. At that time, it seems that a classic phishing email was responsible for the infection of a single PC. Any password or authentication with MFA, no matter how strong, is irrelevant here because the user was already logged on to the PC. But a simple EDR solution with monitoring, for around 150€ a year, could have prevented this. To expand this, we would also suggest phishing tests with suitable software to sufficiently sensibilize the employees. Read more ……