Daily Tech News, Interviews, Reviews and Updates

The NCSC provides complete guideline warning the citizens about foreign adversaries and competitors attempting to steal data

The National Counterintelligence and Security Center (NCSC) leading national counterintelligence for the government of the United States said that foreign adversaries and competitors are seeking unclassified, corporate information related to national and economic security. The sensitive and vulnerable information includes sensitive or proprietary financial, trade, or economic policy information; research and development; technologies; information related to commerce, transportation, agriculture, health, homeland security, energy, and communication.

The NCSC has given detailed information on the ways data can be stolen. These are as follows:

Elicitation: Foreign adversaries can use conversational methods to extract information with the help of digital instruments.

Social Engineering: They can appear as legitimate enterprises or organizations to gain access to sensitive credentials.

Economic Espionage: They can perform direct theft in the trade sector with the help of hacker groups or ransomware groups or other foreign entities.

Human Targeting: They can target an individual person to gain access to their sensitive information impersonating legitimacy.

Cyber Theft: They can compromise digital devices to steal information.

The NCSC then provided further information on how to protect an individual’s data and the nation’s data by being cautious. According to NCSC, an individual can attain a few reliable measures to avoid being a victim of data theft such as avoiding unknown people, refraining from sharing information with people they have just met, maximizing privacy settings on social media accounts, being careful while using shared connections (internet cafes, WiFi networks, and hotel business centers).

The NCSC says in addition to avoiding rampant cyber attacks, “You have access to facilities and computer networks as well as sensitive information, resources, technologies, research and other data that our foreign adversaries and competitors desperately want. Our adversaries and competitors are interested in you because you have connection and access. You also have social media accounts. A work and/or personal smartphone. Social and professional networks include others in sensitive positions. You may travel both domestically and abroad. These are all potential vulnerabilities.”

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More