Table of Contents
< All Topics

Cyber Reputation Attacks Crossover into Physical Ones

Reputation Control and Reputation Management
Digjaks Cyber Security. Reputation. You.

The Crossover from pure cyber crime to real world crime from the same instance.

It is safe to say, times have changed. Now – Cybersecurity has become a word known in almost any home where there is digital connectivity. Time and time again, we are offered proof that cybersecurity now encompasses reputation management. You need active control of search and social media as well as the traditional hardening of data access points, transport points, and login authorities.

Cybersecurity itself has become such a buzzword that it threatens to create a numbness for people hearing it and responding to it.

Recently Digijaks has worked with multiple clients who have faced the crossover from cybersecurity to real life security. It is our recent experience that shows us that law enforcement is *mostly* unprepared for cyber -physical crossover attacks; and does not yet have the substantial depth of understanding of the relationship between social media, cyber security and real life people.

The connections are impossible to overlook.

What starts as a cyber threat, like impersonation of another; brand or trademark attacks, social media memes and fake social media sock puppet accounts — can now easily and does easily cross over into real world crimes.

The real world crimes escalate too, often in parallel with online escalation. In our recent experience in dealing with the crossover, most law enforcement agencies of *all levels* are simply not prepared to cope with this reality, and have few to zero people in place who are trained investigators and can assist the public, or corporations or utilities or governments with cyber cross overs.

Digijaks CEO Alan W. Silberberg is advising both the company’s clients and law enforcement agencies to take these “cyber-physical cross over” events seriously. There is growing evidence amounting that shows that real world crimes are becoming easier in some ways – can be facilitated through initial cyber intrusions, whether phishing, trolling or direct digital attacks. Deep fakes only make this situation more tenuous.

This is leading previously *only* cyber criminals or terrorists to become real world ones too, often at little to no monetary cost. We see this a true emerging threat, as yet mostly being unaddressed either at the Federal or State levels, and a threat that is most acutely faced by high profile people not yet prepared.

wpChatIcon

You cannot copy content of this page