The NCSC provides complete guideline warning the citizens about foreign adversaries and competitors attempting to steal data
The National Counterintelligence and Security Center (NCSC) leading national counterintelligence for the government of the United States said that foreign adversaries and competitors are seeking unclassified, corporate information related to national and economic security. The sensitive and vulnerable information includes sensitive or proprietary financial, trade, or economic policy information; research and development; technologies; information related to commerce, transportation, agriculture, health, homeland security, energy, and communication.
The NCSC has given detailed information on the ways data can be stolen. These are as follows:
Elicitation: Foreign adversaries can use conversational methods to extract information with the help of digital instruments.
Social Engineering: They can appear as legitimate enterprises or organizations to gain access to sensitive credentials.
Economic Espionage: They can perform direct theft in the trade sector with the help of hacker groups or ransomware groups or other foreign entities.
Human Targeting: They can target an individual person to gain access to their sensitive information impersonating legitimacy.
Cyber Theft: They can compromise digital devices to steal information.
The NCSC then provided further information on how to protect an individual’s data and the nation’s data by being cautious. According to NCSC, an individual can attain a few reliable measures to avoid being a victim of data theft such as avoiding unknown people, refraining from sharing information with people they have just met, maximizing privacy settings on social media accounts, being careful while using shared connections (internet cafes, WiFi networks, and hotel business centers).
The NCSC says in addition to avoiding rampant cyber attacks, “You have access to facilities and computer networks as well as sensitive information, resources, technologies, research and other data that our foreign adversaries and competitors desperately want. Our adversaries and competitors are interested in you because you have connection and access. You also have social media accounts. A work and/or personal smartphone. Social and professional networks include others in sensitive positions. You may travel both domestically and abroad. These are all potential vulnerabilities.”
U.S. Government secrets aren't the only thing adversaries are after. Unclassified, corporate information, including proprietary data, R&D, emerging tech & personal data, are all key targets of foreign intelligence services today. https://t.co/OkuG2oPxDt pic.twitter.com/skImdGJYgC
— NCSC (@NCSCgov) July 25, 2022