• HX Weekly
  • Posts
  • Do you have a checklist for predators to get you to pay them?

Do you have a checklist for predators to get you to pay them?

Actually, do YOU have a checklist for yourself when you are being preyed on? Be sure your checklist includes slowing down DESPITE THEM WANTING TO HURRY YOU. The biggest healthcare hack was done by amateur hack that was rewarded $22 million.

☝️ TOP STORY
Handful of change

Tech support, government imposter, family friend imposter, solicitations from scammers usually contain requests to transfer money or act right away is a major red flag.
- Marketplace APM

Anytime you were asked to part with your money, they were checking that list. But be sure you check off your list also. Do you have a personal identifier (see our previous editions)?

🤷‍♀️ What now?

World Password Day is May 2nd, the day after the discovery of the biggest healthcare hack in America was caused by poor authentication.

It seems quite fortuitous that as we enter Word Password Day, America receives the shocking news that Change Healthcare cyberattack was due to a lack of multifactor authentication. The amateur hacker received $22 million.

World Password Day website says “Go through your passwords and make them stronger, coming up with nonsense phrases you can remember, adding spaces, changing letters to numbers and the like to create something no hacker will ever be able to guess.”

Password GIF by BrainPOP

Photo by Kelly Sikkema on Unsplash

If you bug us enough, Hexagon Center just might give you a list on our official website. Meanwhile, visit our Spotlight Files.

Title for the Editor's Note to talk about this edition.

about this edition and Inside Hexagon

With Change Healthcare’s cyberattack, being under the umbrella of United Healthcare may have implications larger than we think. It’s not exaggeration to say that everyone in America might be affected in one way or another.

This is also not the first time that experts say that it’s not if but when we will be attacked.

As Hexagon Center tirelessly works to help protect everyone from cyberattacks and becoming vulnerable, our current resources are limited. This month, we are excited to prepare for our first birthday in June! Please share with us how you would like us to celebrate this milestone!

Glossary/Legend:

  • Your data - is any information about you ranging from your Social Security number to your phone number and address. It may also include your financial account information as well as your location information …

  • Cyber Attackers and Cyber Predators - these terms refer to people who use any kind of technology, including cell phones, to prey on us.

  • Phishing Attack - a type of cyber attack where a malicious actor sends a fake message that appears to come from a trusted source.

  • DRP - Disaster Response Plan. A plan on what to do in times when there is a disaster and you have lost your devices.

  • Ransomware - is a set of technologies that allow computers to perform advanced functions. AI combines math, computer science, and cognitive science to mimic human behavior.

  • Deepfake - A synthetic media that has been manipulated to replace one person's likeness with another. Deepfakes are created by a special type of machine learning called "deep" learning. They can be videos, photos, or audio recordings that appear real but have been manipulated with AI.

HOUSEKEEPING

Spread cybersecurity culture

Do you have any suggestions on how we can further share this newsletter? Tell your friends and family about us by sharing with them the Hexagon Center official website:

You may reply to this newsletter or email us at
[email protected]

Send us any questions or things you want to talk about. Please share some fun facts with us. We welcome feedback and suggestions.

Hexagon Center is formed as a nonprofit corporation in California for public benefit,
in the process of attaining 501(C)(3) status.

DISCLAIMER

Cybersecurity is an ever-changing field, and threats may evolve. While Hexagon Center strives to provide accurate and timely information, we cannot guarantee absolute security. Users are responsible for implementing their security measures and staying informed about the latest cybersecurity developments.

Reply

or to participate.