-
#cyberinsurance2
-
#cybersecurityinsurance2
-
#moveit1
-
#moveit hack1
-
5 Key Cybersecurity Trends of 20234
-
AI Cybersecurity Risk16
-
AI Tabletop Fail1
-
Anti-Corruption5
-
Artificial Intelligence Cybersecurity14
-
Attack Surface Areas31
-
Board of Director Cybersecurity Risk1
-
Board of Directors Cybersecurity1
-
Bots Against Us4
-
Celebrities Cybersecurity31
-
Celebrities Reputation32
-
Celebrity Cybersecurity31
-
Celebrity Reputation27
-
Celebrity Reputation and You3
-
Coronavirus Cyber Security Concerns2
-
Corprorate Cyber Security.43
-
Covid-19 + Cybersecurity2
-
Crisis Security30
-
Critical Infrastructure Cyber Risk15
-
Crypto4
-
Crypto Currency Market Meltdown3
-
Crypto Cybersecurity5
-
Cyber0
-
Cyber + Reputation Risk26
-
Cyber Reputation20
-
Cyber Reputation Control51
-
Cyber Reputation Management40
-
Cyber Reputation Risk34
-
Cyber Reputation Wealth21
-
Cyber risk0
-
Cyber Risk + Hazards1
-
Cyber Security41
-
Cyber Security Venture Capital19
-
Cyber Stalking5
-
Cyber Warfare24
-
Cyberinsurance by Digjjaks3
-
cybersecurity55
-
Cybersecurity + Reputation Management28
-
Cybersecurity for Water Utilities8
-
Cybersecurity in Time of Cyberwar11
-
Cybersecurity Insurance3
-
Cybersecurity Insurance Governance1
-
Cybersecurity of Covid-191
-
Cybersecurity of Mobile26
-
Cybersecurity Risk Vectors In Crypto7
-
Cybersecurity Trends10
-
Cybersecurity Wealth Reputation15
-
cyberwar25
-
Dalai VC1
-
Deep Fakes18
-
Developed by Digijaks6
-
Digijaks0
-
Digijaks Group Cybersecurity Insurance2
-
Digijaks Reputation Control21
-
Digijaks Services4
-
DigijaksAI0
-
Digital Defense20
-
Digital Diplomacy4
-
Digital Shield11
-
Disinformation4
-
Family Reputation Management19
-
Gov 2.013
-
Gov 3.010
-
Hack Schools1
-
Hacking Schools1
-
Hacking Unversities1
-
Identity5
-
Identity Reputation5
-
IoT Devices10
-
IoT Security30
-
Law Firm Cyber Risks3
-
Mobile Cybersecurity24
-
Navigating Privacy Security2
-
Online Reputation Control40
-
Online Reputation Management29
-
Online Reputation Security39
-
Personal Cyber security31
-
Platform/Service6
-
Quantum Computing15
-
Quantum Security4
-
Ransomware3
-
Renewable Energy Cyber7
-
Renewable Energy Reputations4
-
reputation0
-
Reputation + Cyber Risk17
-
Reputation + Cyber Risk of Quantum Computing12
-
Reputation and Cyber Personal Defenses8
-
Reputation Control36
-
Reputation Control and Management38
-
Reputation Management23
-
Reputation Management for Families15
-
Reputation Risk16
-
Reputation Security50
-
Reputation Security | Coronavirus2
-
Reputational Wealth Management21
-
School Hacking1
-
Social Engineering26
-
Social Media Cyber Security30
-
The Growing Threat1
-
US National Cyber Defense15
-
Venture Capital2
-
Venture Capital Cyber Security8
-
Wealth Repuation Cybersecurity10
-
Wealth Reputation Cybersecurity2
-
wealth security1
-
Weaponized Media7
Dimensions of CyberWar

What happens when the down arrow suddenly points up?
How would you know what a cyber attack on critical infrastructure might look like?
At a time of War in Ukraine, Russia has been amping up their threats and actual attacks, along with other hostile nation states jumping in at the same time, what does an organization do? How do you recognize a critical infrastructure attack from a technical failure? How does the civilian population?
Well, sometimes it might be a blinking light, or an arrow pointing in the wrong direction that is the only hint. Literally something as stupid as that.
How do we know? Do the authorities tell us necessarily if there is a cyber attack on critical infrastructure? What is the difference to you or someone else when a utility or a transport service has an outage blamed on “technical failure”? Or when it is an attack on critical infrastructure? President Biden only recently signed into law breach notification responsibilities for critical infrastructure, so most likely up until now, the average person would never have known – unless it was actually reported in the media.
Unfortunately, we may not always know. The reporting and breach notification rules and attention to them vary greatly by industry, state and even whether workers are fulfilling their obligations or not.
If one thinks about the term “Cyber War” and the sheer variety of attack vectors and attack surface areas, one gets approximately these at a very minimum *note that is not including every single attack vector*.
Hacking.
Infrastructure Damaging.
Fake websites.
Fake social media.
SMS phishing in addition to email.
Videos w malware.
Worms.
Denial of Service.
USB Stick + personal byod attacks.
Account takeover attacks.
Social engineering attacks.
Malware laden mobile apps.
Exploitation of known network and ICS / IoT weaknesses.
Related
- Corporate Espionage
- Cyber Reputation Management
- Cyber Security
- Cyber Warfare
- Cybersecurity + Reputation Control
- digijaks
- Digijaks Cyber Security
- Digijaks Cybersecurity + Reputation Security
- Digijaks Group Cyber Security
- Reputation Control
- Reputation Control + CyberSecurity
- Reputation Control And Management
- Reputation Management
- Social Media Cyber Security