Many people mistakenly believe they are not a target and their information or computer has no value. However, your personal information and your computer have tremendous value. In fact, you are one of the cyber criminal’s primary targets.

Crime has existed for thousands of years, and attacks such as fraud, identify theft, and extortion are very common. However, the Internet has made these crimes much more profitable, much simpler to commit, and with far less risk to the criminal.

Before the Internet, criminals could only steal what they physically had access to. Today,
criminals use the Internet to target millions of people worldwide, twenty four hours a day,
seven days a week. And they now have access to sophisticated tools that automate these
attacks — meaning you are constantly under attack by thousands of worldwide criminals.

The simplest way to hack into an organization is by targeting its employees. Unaware employees are the greatest weakness because they make common mistakes, such as clicking on malicious links or using infected USB sticks. As a result of these mistakes, you have become a primary target.

The simplest way to hack into an organization is by targeting its employees. Unaware employees are the greatest weakness because they make common mistakes, such as clicking on malicious links or using infected USB sticks. As a result of these mistakes, you have become a primary target.

The first step is to understand you are a target. Too often, people believe no one would want to attack them because they have nothing of value. As a result, they do not take the necessary steps to protect themselves, their family, or their information.

In this newsletter, we explain why you are a target and how cyber criminals can find and attack you. By understanding how these threats operate, you will be able to better defend yourself, and we will teach you some fundamental concepts on how you can protect yourself, your family, and our organization.

How and Why Cyber Criminals Find You
Cyber criminals are out to make money — their goal is to make as much money as possible as fast as possible. Once a cyber criminal infects your computer or steals your information, they can then use that information to commit identity theft and fraud, or they can sell your information to other cyber criminals. Cyber criminals will often attempt to not only steal your personal information, but will try to hack you to get into your organization.

The easiest way to accomplish this is to target everyone in the world. If you have an email address, bank account, or computer or mobile device connected to the Internet, you can be attacked. Attackers achieve this by using highly sophisticated tools that fully automate the process of hacking. For example, cyber criminals can scan every computer and mobile device connected to the Internet, and, if they find any system vulnerable, they will automatically hack into it.

Another approach attackers use is building (or purchasing) a database of millions of email
addresses. Criminals will craft email attacks and send those emails to every address in the
database. Unfortunately, the number of emails cyber criminals have access to is constantly
growing. Every time they hack into an organization, they steal email addresses and use them for future attacks, or sell those email accounts to other cyber criminals.

Cyber Crime Is Highly Organized
Over the past decade, cyber criminals have become more and more sophisticated. When cyber criminals first appeared, they often worked alone. They had to build their own attack tools, manually find and hack into computers, send out spam, steal account information, and transfer or wire stolen money all by themselves.

Today’s cyber criminals are far more sophisticated. Each criminal now has their own specific field of expertise, and working together, they have developed their own highly organized community. One group is dedicated to developing and supporting sophisticated attack tools. Another group specializes in hacking into other computers or stealing personal information. Others work to sell compromised computers or stolen bank accounts, while an entirely different group transfers and launders stolen money.

An entire cybercrime economy has emerged, which is constantly improving its tactics and becoming more effective and efficient in making money every day. These criminals form a highly sophisticated threat, one that will be with us for many years to come.

Print this newsletter: Module01-YouAreTheTarget-Newsletter

© The SANS Institute 2013  /  Used with permission from The SANS Institute.


This entry was posted in Cyber Security Awareness Month, Cyber Security Tip, Uncategorized. Bookmark the permalink.

24 Responses to YOU ARE THE TARGET

  1. Hmm iit seems lie yur blog ate myy first comment (it was super long) so I guess I’ll just sum it up what I had written and say,
    I’m thoroughly enjoying your blog. I too am an aspiring blog writsr but
    I’m still new tto the whole thing. Do you have any points for novie blog writers?
    I’d definitely appreciate it.

    Also visit my web page … Auckland SEO Services

  2. Mirtha says:

    hi!,I like your writing so much! proportion we keep in touch more approximately your post on AOL? I need an expert in this house to solve my problem. Maybe that’s you! Looking ahead to see you.

  3. I usually do not write a leave a response, but I browsed a few
    remarks on YOU ARE THE TARGET | IT Security Tips for
    ECU Users. I actually do have 2 questions for you if
    it’s okay. Could it be just me or does it look
    as if like a few of the remarks come across like they are written by brain dead folks?
    :-P And, if you are posting on other social sites, I would like to keep up with you.
    Could you post a list of the complete urls of all your social community sites like your twitter feed, Facebook page or linkedin profile?

    Check out my web site – nettikasino bonukset (

  4. I absolutely love your blog and find many of your post’s to be just what I’m looking for.

    Do you offer guest writers to write content to suit your needs?
    I wouldn’t mind publishing a post or elaborating on a lot of the subjects you write
    related to here. Again, awesome blog!

    My web page: netticasino bonus (

  5. Gabriel says:

    You have some really great articles and I think I would be a good asset. I’d absolutely love to write some content for your blog in exchange for a link back to mine. Please blast me an email if interested. Thanks!

  6. Reinaldo says:

    I’m very happy to read this. This is the kind of manual that needs to be given and not the accidental misinformation that is at the other blogs. Appreciate your sharing this best doc.

  7. I just want to say I am just all new to weblog and definitely loved you’re web page. Probably I’m want to bookmark your website . You surely have impressive stories. Thanks a bunch for revealing your web page.

  8. Google says:

    Here are some of the sites we recommend for our visitors.

  9. ayesha kids says:

    I am curious to find out what blog system you’re working with?

    I’m experiencing some small security issues with my latest site and I’d like to find something more risk-free.
    Do you have any suggestions?

  10. Its great as your other blog posts : D, thanks for putting up.

  11. Great website. A lot of useful info here. I am sending it to several friends ans also sharing in delicious. And obviously, thanks for your effort!

  12. instagram says:

    I’ve been exploring for a little for any high quality articles or blog posts on this kind of area . Exploring in Yahoo I at last stumbled upon this web site. Reading this info So i’m happy to convey that I’ve a very good uncanny feeling I discovered just what I needed. I most certainly will make sure to don’t forget this site and give it a glance on a constant basis.

  13. Thank you for sharing excellent informations. Your web-site is so cool. I am impressed by the details that you?¦ve on this blog. It reveals how nicely you perceive this subject. Bookmarked this website page, will come back for extra articles. You, my friend, ROCK! I found simply the info I already searched everywhere and simply could not come across. What a great site.

  14. I have read some just right stuff here. Definitely worth bookmarking for revisiting. I surprise how a lot effort you set to make the sort of excellent informative site.

  15. h24 fashion says:

    I am perpetually thought about this, thanks for putting up.

  16. Nice post. I was checking constantly this blog and I am impressed! Extremely helpful info particularly the last part :) I care for such information much. I was looking for this certain info for a long time. Thank you and best of luck.

  17. You can certainly see your expertise within the paintings you write. The arena hopes for more passionate writers like you who aren’t afraid to say how they believe. At all times go after your heart.

  18. This design is spectacular! You obviously know how to keep a reader entertained. Between your wit and your videos, I was almost moved to start my own blog (well, almost…HaHa!) Excellent job. I really loved what you had to say, and more than that, how you presented it. Too cool!

  19. seo yahoo says:

    I love looking through and I conceive this website got some truly utilitarian stuff on it! .

  20. I like what you guys tend to be up too. This sort of clever work and exposure! Keep up the superb works guys I’ve you guys to blogroll.

  21. This design is steller! You certainly know how to keep a reader amused. Between your wit and your videos, I was almost moved to start my own blog (well, almost…HaHa!) Excellent job. I really loved what you had to say, and more than that, how you presented it. Too cool!

  22. Way cool, some valid points! I appreciate you making this article available, the rest of the site is also high quality. Have a fun.

  23. Greetings from California! I’m bored to death at work so I decided to browse your website on my iphone during lunch break. I enjoy the knowledge you provide here and can’t wait to take a look when I get home. I’m surprised at how quick your blog loaded on my phone .. I’m not even using WIFI, just 3G .. Anyways, amazing blog!

  24. I’m no longer sure where you are getting your information, but good topic. I must spend some time learning more or working out more. Thank you for excellent info I was in search of this information for my mission.

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>