Zach Fuller is an entrepreneur who has built businesses in multiple industries. He served as Green Beret in the U.S. Army, conducting highly sensitive combat operations in Afghanistan. Zach was awarded a Bronze Star Medal and other decorations for his actions overseas. He later built an investor relations team for a private equity company. Holding the role of Executive Vice President, he lead the team to raising well over $300,000,000 in private capital to acquire real estate assets and making it to the Inc. 500 list of Fastest Growing Private Companies. Zach is a Certified Ethical Hacker and founding partner of Silent Sector, where he is focused on mid-market and emerging companies which he considers to be the backbone of the American economy and our way of life.
Find me on:
Medium.com,
Apple Podcasts,
Amazon, and
Businesswire.com
Silent Sector® builds and strengthens exceptional cybersecurity programs for US-based mid-market and emerging companies.
Expertise-Driven Cybersecurity®
Cyber Criminals Don't Really Care About Your Personal Data
If you are an American citizen over the age of 30, it is almost guaranteed that your home address, date of birth, social security information, and much more personally identifiable information (PII) is already exposed and being sold on the darkweb. While PII and credit card data is not quite a "dime a dozen", it's almost there. Nowadays, your personal data is packaged with others' and is a commodity available in bulk to any cyber criminals wanting it.
Unfortunately, the general public still believes that PII and credit card data are the primary targets of cyber criminals. While this information is still stolen on a regular basis, it is important for the public to recognize a bigger picture and threats posed by criminals around the world.
Most criminals are probably not specifically targeting you or your company, but without an effective security posture it is easy to be singled out. Mass scanning tools and distributed systems make finding security weaknesses easier for criminals than ever before.
This is a short list of common threats and attacks that occur when criminals find a security flaw in an organization's systems:
While a few cyber criminals focus on hacktivism and bragging rights, the vast majority are focused on generating income from targets of opportunity. It is important to realize there are many ways for criminals to profit from cyber attacks and they don't need to involve PII or credit card data.
When's the last time your company did a vulnerability scan? We offer a complimentary scan and consultation below!