{"id":919,"date":"2024-02-16T21:10:02","date_gmt":"2024-02-16T21:10:02","guid":{"rendered":"https:\/\/pjleeandassoc.com\/staging\/6611\/?page_id=919"},"modified":"2024-02-16T21:10:03","modified_gmt":"2024-02-16T21:10:03","slug":"current-events","status":"publish","type":"page","link":"https:\/\/pjleeandassoc.com\/staging\/6611\/current-events\/","title":{"rendered":"Current Events"},"content":{"rendered":"\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-fc34c24\" data-block-id=\"fc34c24\"><style>.stk-fc34c24{height:30px !important}<\/style><\/div>\n\n\n\n<p class=\"\"><strong><br>Navigating the Impact: How Current Events Shape Social Engineering<\/strong><\/p>\n\n\n\n<p class=\"\">Dear Readers,<\/p>\n\n\n\n<p class=\"\">In the realm of cybersecurity, the interplay between current events and social engineering tactics is undeniable. From global crises to political upheavals and natural disasters, these events serve as breeding grounds for cyber threats. Let&#8217;s delve into how recent events, including COVID-19, political shifts (such as the Trump era), conflicts, banking crises, and natural disasters, influence social engineering techniques:<\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-4bc0e53\" data-block-id=\"4bc0e53\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-c586446\" data-block-id=\"c586446\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>COVID-19 Pandemic:<\/strong>&nbsp;The COVID-19 pandemic has ushered in a new era of cyber threats, with attackers exploiting the fear, uncertainty, and reliance on digital communication channels. Phishing attacks impersonating health organizations, fraudulent vaccine offers, and COVID-themed scams prey on individuals seeking information or assistance during the crisis.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Example:<\/strong>&nbsp;Cybercriminals send emails posing as reputable health authorities, offering fake vaccines or COVID-related products, aiming to steal personal information or distribute malware.<\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-d63d010\" data-block-id=\"d63d010\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-e867cb6\" data-block-id=\"e867cb6\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Political Shifts (e.g., Trump Era):<\/strong>&nbsp;Political transitions or controversies often create opportunities for social engineering manipulation. During the Trump era, heightened polarization and media attention provided fertile ground for disinformation campaigns, fake news dissemination, and targeted propaganda aimed at influencing public opinion.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Example:<\/strong>&nbsp;Malicious actors exploit political divides by creating fake news articles or social media posts to spread false information and manipulate public sentiment.<\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-885470d\" data-block-id=\"885470d\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-f0ae824\" data-block-id=\"f0ae824\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Conflicts and Wars:<\/strong>&nbsp;Geopolitical conflicts and wars fuel social engineering tactics, leveraging heightened emotions, geopolitical tensions, and humanitarian crises. Attackers exploit these situations to propagate disinformation, manipulate public opinion, and orchestrate targeted attacks against governments, organizations, and individuals.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Example:<\/strong>&nbsp;Cybercriminals use fake charity appeals or humanitarian aid campaigns to solicit donations for fictitious causes, diverting funds to their own pockets.<\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-a26361e\" data-block-id=\"a26361e\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-c6603d6\" data-block-id=\"c6603d6\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Banking Crises:<\/strong>&nbsp;During periods of economic uncertainty or banking crises, social engineering attacks targeting financial institutions and individuals intensify. Phishing scams, fraudulent investment schemes, and identity theft schemes aim to capitalize on individuals&#8217; financial anxieties and vulnerabilities.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Example:<\/strong>&nbsp;Scammers send emails posing as bank officials, warning of account breaches or financial emergencies, prompting recipients to disclose sensitive information or transfer funds to fraudulent accounts.<\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-dd8763c\" data-block-id=\"dd8763c\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-cda0726\" data-block-id=\"cda0726\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Natural Disasters:<\/strong>&nbsp;Natural disasters, such as hurricanes, earthquakes, or wildfires, provide opportunities for social engineering exploitation. Attackers prey on individuals&#8217; compassion and desire to help by launching fake relief efforts, charity scams, or emergency assistance schemes.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Example:<\/strong>&nbsp;Cybercriminals create fake websites or social media accounts posing as relief organizations, soliciting donations for disaster relief efforts, which never reach the intended beneficiaries.<\/p>\n\n\n\n<p class=\"\"><strong>Tips to Avoid Social Engineering Attacks:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-7b2fbd9\" data-block-id=\"7b2fbd9\"><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-7b2fbd9\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-8815bc9\" data-block-id=\"8815bc9\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7b2fbd9\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Stay Informed: Keep abreast of current events from reputable sources and be cautious of unsolicited communications related to these events.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-f5fd882\" data-block-id=\"f5fd882\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7b2fbd9\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Verify Sources: Always verify the authenticity of sources before engaging with or sharing online content, especially during times of heightened sensitivity or controversy.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-601bf90\" data-block-id=\"601bf90\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7b2fbd9\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Exercise Critical Thinking: Approach online content with skepticism and critically evaluate the legitimacy of information before sharing or acting upon it.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-3867fe5\" data-block-id=\"3867fe5\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7b2fbd9\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Enhance Cybersecurity Measures: Implement robust security protocols, such as multi-factor authentication and regular software updates, to protect against social engineering tactics.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-38662f1\" data-block-id=\"38662f1\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7b2fbd9\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Educate Yourself and Others: Educate yourself and your family members about the risks of social engineering attacks and how to identify and prevent them.<\/span><\/div><\/li>\n<\/ul><\/div>\n\n\n\n<p class=\"\">As we navigate the complex landscape of social engineering in the face of current events, it&#8217;s crucial to remain vigilant, discerning, and proactive in safeguarding ourselves and our communities against cyber threats. Stay informed, exercise critical thinking, and adopt robust cybersecurity measures to mitigate the risks posed by social engineering manipulation.<\/p>\n\n\n\n<p class=\"\">Stay informed, stay secure.<\/p>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-e1a223f\" data-block-id=\"e1a223f\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Navigating the Impact: How Current Events Shape Social Engineering Dear Readers, In the realm of cybersecurity, the interplay between current events and social engineering tactics is undeniable. From global crises to political upheavals and natural disasters, these events serve as breeding grounds for cyber threats. Let&#8217;s delve into how recent events, including COVID-19, political shifts [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-919","page","type-page","status-publish","hentry"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Current Events - PJ Lee and Associates<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pjleeandassoc.com\/current-events\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Current Events - PJ Lee and Associates\" \/>\n<meta property=\"og:description\" content=\"Navigating the Impact: How Current Events Shape Social Engineering Dear Readers, In the realm of cybersecurity, the interplay between current events and social engineering tactics is undeniable. From global crises to political upheavals and natural disasters, these events serve as breeding grounds for cyber threats. Let&#8217;s delve into how recent events, including COVID-19, political shifts [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pjleeandassoc.com\/current-events\/\" \/>\n<meta property=\"og:site_name\" content=\"PJ Lee and Associates\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-16T21:10:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/current-events\\\/\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/current-events\\\/\",\"name\":\"Current Events - PJ Lee and Associates\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#website\"},\"datePublished\":\"2024-02-16T21:10:02+00:00\",\"dateModified\":\"2024-02-16T21:10:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/current-events\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pjleeandassoc.com\\\/current-events\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/current-events\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pjleeandassoc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current Events\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#website\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/\",\"name\":\"PJ Lee and Associates\",\"description\":\"Specialists in Compliance and Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pjleeandassoc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#organization\",\"name\":\"PJ Lee and Associates\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/staging\\\/6611\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/PJLeeLogoSmall.png\",\"contentUrl\":\"https:\\\/\\\/pjleeandassoc.com\\\/staging\\\/6611\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/PJLeeLogoSmall.png\",\"width\":188,\"height\":187,\"caption\":\"PJ Lee and Associates\"},\"image\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Current Events - PJ Lee and Associates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pjleeandassoc.com\/current-events\/","og_locale":"en_US","og_type":"article","og_title":"Current Events - PJ Lee and Associates","og_description":"Navigating the Impact: How Current Events Shape Social Engineering Dear Readers, In the realm of cybersecurity, the interplay between current events and social engineering tactics is undeniable. From global crises to political upheavals and natural disasters, these events serve as breeding grounds for cyber threats. Let&#8217;s delve into how recent events, including COVID-19, political shifts [&hellip;]","og_url":"https:\/\/pjleeandassoc.com\/current-events\/","og_site_name":"PJ Lee and Associates","article_modified_time":"2024-02-16T21:10:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pjleeandassoc.com\/current-events\/","url":"https:\/\/pjleeandassoc.com\/current-events\/","name":"Current Events - PJ Lee and Associates","isPartOf":{"@id":"https:\/\/pjleeandassoc.com\/#website"},"datePublished":"2024-02-16T21:10:02+00:00","dateModified":"2024-02-16T21:10:03+00:00","breadcrumb":{"@id":"https:\/\/pjleeandassoc.com\/current-events\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pjleeandassoc.com\/current-events\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pjleeandassoc.com\/current-events\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pjleeandassoc.com\/"},{"@type":"ListItem","position":2,"name":"Current Events"}]},{"@type":"WebSite","@id":"https:\/\/pjleeandassoc.com\/#website","url":"https:\/\/pjleeandassoc.com\/","name":"PJ Lee and Associates","description":"Specialists in Compliance and Cybersecurity","publisher":{"@id":"https:\/\/pjleeandassoc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pjleeandassoc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pjleeandassoc.com\/#organization","name":"PJ Lee and Associates","url":"https:\/\/pjleeandassoc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pjleeandassoc.com\/#\/schema\/logo\/image\/","url":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-content\/uploads\/2024\/02\/PJLeeLogoSmall.png","contentUrl":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-content\/uploads\/2024\/02\/PJLeeLogoSmall.png","width":188,"height":187,"caption":"PJ Lee and Associates"},"image":{"@id":"https:\/\/pjleeandassoc.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/comments?post=919"}],"version-history":[{"count":1,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/919\/revisions"}],"predecessor-version":[{"id":920,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/919\/revisions\/920"}],"wp:attachment":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/media?parent=919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}