{"id":26007,"date":"2023-05-26T12:10:28","date_gmt":"2023-05-26T11:10:28","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/personal-threat-landscape\/26007\/"},"modified":"2023-05-26T12:10:28","modified_gmt":"2023-05-26T11:10:28","slug":"personal-threat-landscape","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/personal-threat-landscape\/26007\/","title":{"rendered":"Know your personal threat landscape"},"content":{"rendered":"<p>If you try to protect yourself against every threat in the world, you\u2019ll soon run out of energy and make your life unbearable. Three-factor authentication here, a twenty-character password with musical notes and Chinese characters there, <a href=\"https:\/\/www.kaspersky.com\/blog\/private-browsers-beginners-guide\/48066\/\" target=\"_blank\" rel=\"noopener nofollow\">different browsers for different websites<\/a>, and abstinence from social media don\u2019t exactly sound life-asserting.<\/p>\n<p>What hurts the most is that using practically all such security measures won\u2019t help protect you against every threat: new ones just keep on sprouting up, and they call for new protection methods. Meanwhile, most new layers of security lower usability: having <a href=\"https:\/\/www.kaspersky.com\/blog\/authenticator-apps-and-security\/47426\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> will never be easier than not having it. And that\u2019s the least obnoxious example. So what can you do about this? Create your own threat landscape, as corporations do when they design their security processes, and secure yourself only against those threats within that landscape.<\/p>\n<h2>What a threat landscape is, and what it has to do with you<\/h2>\n<p>In the field of corporate security, a threat landscape is the aggregate of cyberwoes that threaten a company in a certain industry within a certain period of time. These include vulnerabilities, malware, and ransomware groups and the techniques they use.<\/p>\n<p>An overview of the threat landscape helps define what exactly the company needs to be protected against. Some threats will be more pressing than others, depending on the company\u2019s location and business. And since a security budget always has its limits, just like the number of security staff, it makes sense to secure against the truly relevant threats.<\/p>\n<p>Why not create a threat landscape like that for yourself and base your own personal security strategy on it? This would keep you from getting bogged down with multiple layers of protection and help you keep on using the internet with at least some degree of comfort.<\/p>\n<h2>Building a personal threat landscape<\/h2>\n<p>Every individual, just like every company, has a threat landscape of their own. Whether you use, say, TikTok or Instagram, and whether you have a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-secure-is-your-password-manager\/47034\/\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a> or not influences which threats are more relevant to you. Many other factors have an influence too, such as where you live, what operating system you have on your computer, what instant messaging apps you use, and who you text with using these apps.<\/p>\n<p>That said, all these personal threat landscapes have certain elements in common, as we all live in the 21<sup>st<\/sup> century, all use computers and smartphones, and all browse the Web. Therefore, for the purposes of this discussion, a personal threat landscape can be divided into common and individual parts, with the common part mostly applicable to everyone, and the individual part determined by the person\u2019s particular situation.<\/p>\n<h3>The common part of a threat landscape<\/h3>\n<p>If you\u2019re a regular reader of this blog, you have a rough idea of the types of threats that are most frequent and relevant regardless of country of residence. First and foremost, these are <strong>phishing<\/strong>, <strong>data leaks<\/strong>, and various <strong>scams<\/strong>. Every single person needs to stay protected against these.<\/p>\n<p>The best safeguard against phishing is learning to detect it. To do this, you should do the following:<\/p>\n<ul>\n<li>Learn what <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> is;<\/li>\n<li>Get an idea of the <a href=\"https:\/\/www.kaspersky.com\/blog\/password-leaks\/45296\/\" target=\"_blank\" rel=\"noopener nofollow\">main tricks<\/a> that phishers use;<\/li>\n<li>Learn the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">typical signs of phishing<\/a>, such as a fishy (pun intended) sender address, suspicious links, and so on.<\/li>\n<\/ul>\n<p>Securing yourself against data leaks is harder, as these are most often not your fault, but that of some service you\u2019re a user of. As every one of us uses many online services \u2014 from <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/social-media\/\" target=\"_blank\" rel=\"noopener nofollow\">social media<\/a> to <a href=\"https:\/\/www.kaspersky.com\/blog\/safe-online-shopping\/46289\/\" target=\"_blank\" rel=\"noopener nofollow\">online stores<\/a>, and from <a href=\"https:\/\/www.theguardian.com\/australia-news\/2022\/dec\/01\/medibank-hackers-announce-case-closed-and-dump-huge-data-file-on-dark-web\" target=\"_blank\" rel=\"nofollow noopener\">insurance companies<\/a> to <a href=\"https:\/\/techcrunch.com\/2022\/08\/25\/doordash-customer-data-breach-twilio\/\" target=\"_blank\" rel=\"nofollow noopener\">delivery services<\/a> \u2014 it gets hard to keep an eye on every single one.<\/p>\n<p>Generally, you need to be prepared for leaks, while [placeholder corpsite]any of the new Kaspersky products[\/placeholder] with a data-leak alert feature can help you monitor the ones relevant to you. Monitoring is, for sure, a good thing, but what about the data that gets leaked? Well, this is something you can only respond to: change passwords swiftly, get your bank cards blocked <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-emv-and-nfc-bank-cards\/47475\/\" target=\"_blank\" rel=\"noopener nofollow\">if needed<\/a>, and keep in mind that being addressed by your full name in an e-mail signed with your personal account manager\u2019s name is no guarantee the e-mail really is from your bank. The bank might have had its database leaked and scammers could be using it for phishing.<\/p>\n<p>Finally, there are <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-online-scam\/43908\/\" target=\"_blank\" rel=\"noopener nofollow\">all sorts of scams<\/a> around the world,\u00a0 which do differ significantly among countries. Still, they do have common features. As in the case of phishing, knowledge is your best protection. So, keep reading <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/scam\/\" target=\"_blank\" rel=\"noopener nofollow\">our blog<\/a> to learn about various scam types, and take a critical look at everything that\u2019s either too good to be true or screams danger and <a href=\"https:\/\/www.kaspersky.com\/blog\/bitcoin-cloud-mining-scam\/47616\/\" target=\"_blank\" rel=\"noopener nofollow\">calls for an immediate response<\/a>: scammers typically either play on human greed or try putting their victims under stress to unnerve them and have them drop their guard.<\/p>\n<p>Phishing, data leaks and scams are the three most common threat types that are relevant to everyone. Next, let\u2019s discuss the individual part of a threat landscape, which depends on who you are and your online habits.<\/p>\n<h3>The individual part of a threat landscape<\/h3>\n<p>To create a personal threat landscape, first you need to get introspective and describe yourself and your habit. What websites and instant messaging services do you use? Do you have a separate business phone? Do you work from home or an office, and what computer do you use?<\/p>\n<p>Next, depending on your answers to the above, you can start creating a landscape of relevant threats and security measures simply by going through the list.<\/p>\n<p>Let\u2019s say you\u2019re an active user of social media. In that case, you need to secure yourself against <a href=\"https:\/\/www.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/38858\/\" target=\"_blank\" rel=\"noopener nofollow\">account hacks<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/instagram-ban-attacks\/41317\/\" target=\"_blank\" rel=\"noopener nofollow\">ban attacks<\/a>, and account hijacking (<a href=\"https:\/\/www.kaspersky.com\/blog\/instagram-hijack-new-wave\/25997\/\" target=\"_blank\" rel=\"noopener nofollow\">Instagram<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/38571\/\" target=\"_blank\" rel=\"noopener nofollow\">Facebook<\/a>). You also need to set proper privacy settings in <a href=\"https:\/\/www.kaspersky.com\/blog\/keep-instagram-secure\/11045\/\" target=\"_blank\" rel=\"noopener nofollow\">Instagram<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-off-facebook-activity\/38824\/\" target=\"_blank\" rel=\"noopener nofollow\">Facebook<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/tiktok-privacy-security\/32333\/\" target=\"_blank\" rel=\"noopener nofollow\">TikTok<\/a>, and <a href=\"https:\/\/www.kaspersky.com\/blog\/twitter-privacy-security\/32447\/\" target=\"_blank\" rel=\"noopener nofollow\">Twitter<\/a>.<\/p>\n<p>The state of privacy in niche social media, such as Vivino (for wine lovers) and Untappd (for beer lovers), is lamentable: your alcohol discoveries are visible to anyone by default. If you\u2019d rather not share your lost weekend with the world, be sure to configure these apps so that your <a href=\"https:\/\/www.kaspersky.com\/blog\/vivino-privacy-security-settings\/43781\/\" target=\"_blank\" rel=\"noopener nofollow\">wine<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/untappd-privacy-security-settings\/34596\/\" target=\"_blank\" rel=\"noopener nofollow\">beer<\/a> adventures remain your little secret.<\/p>\n<p>Or, say, you\u2019re an avid gamer and a Steam user. If so, you should safeguard yourself against Trojan stealers targeting user accounts and scammers who <a href=\"https:\/\/www.kaspersky.com\/blog\/modern-gamers-threats\/47363\/\" target=\"_blank\" rel=\"noopener nofollow\">run schemes<\/a> inside games that make such activity possible. What can you do about this? Read up on <a href=\"https:\/\/www.kaspersky.com\/blog\/tales-from-steam\/38691\/\" target=\"_blank\" rel=\"noopener nofollow\">Steam scams<\/a>, and configure the <a href=\"https:\/\/www.kaspersky.com\/blog\/steam-privacy-security\/33981\/\" target=\"_blank\" rel=\"noopener nofollow\">security features of that service<\/a>.<\/p>\n<p>Suppose you\u2019re a blogger or the owner of a popular Telegram channel. Well, your biggest threats are <a href=\"https:\/\/www.kaspersky.com\/blog\/tips-for-hacked-account\/36760\/\" target=\"_blank\" rel=\"noopener nofollow\">account theft<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/doxing-methods\/39651\/\" target=\"_blank\" rel=\"noopener nofollow\">doxing<\/a> \u2014 the latter more commonly <a href=\"https:\/\/www.kaspersky.com\/blog\/doxing-of-women\/46812\/\" target=\"_blank\" rel=\"noopener nofollow\">experienced by women<\/a>. What can you do about this? Learn how accounts typically <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-takeover-contest\/47195\/\" target=\"_blank\" rel=\"noopener nofollow\">get hijacked<\/a>, and get a reliable <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">security product<\/a> to neutralize Trojans and alert you about phishing and personal data leaks.<\/p>\n<p>Even if you decide you\u2019re no longer interested in social media or games, don\u2019t leave your accounts hanging, unattended: they could be hacked and used against you by accessing your personal data. The worst bit is: you won\u2019t learn about this any time soon \u2014 or ever. Therefore, we recommend you look at our guide on <a href=\"https:\/\/www.kaspersky.com\/blog\/do-not-abandon-your-accounts\/29029\/\" target=\"_blank\" rel=\"noopener nofollow\">managing accounts you don\u2019t use\/need<\/a>.<\/p>\n<p>Many naively believe that they may only encounter cyberfraud in their personal space, whereas work is safe, guarded by trained professionals, and generally, no place for scams or phishing! Nothing could be further from the truth. If you\u2019re looking for a job, you could be the <a href=\"https:\/\/www.kaspersky.com\/blog\/top-2023-job-scams-and-how-to-avoid-them\/46954\/\" target=\"_blank\" rel=\"noopener nofollow\">perfect target for scammers<\/a>. If you started working at a new company recently, <a href=\"https:\/\/www.kaspersky.com\/blog\/new-employee-scam\/47520\/\" target=\"_blank\" rel=\"noopener nofollow\">keep your eyes open<\/a> for fake coworkers. If you\u2019re remote or use a personal computer for work, <a href=\"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/\" target=\"_blank\" rel=\"noopener nofollow\">set up your workspace<\/a> so as to avoid harming your employer, and research <a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-desktop-messengers\/47453\/\" target=\"_blank\" rel=\"noopener nofollow\">what software you shouldn\u2019t use for work<\/a>.<\/p>\n<p>Finally, be especially careful if you\u2019re a crypto investor: since cryptocurrency transactions are not protected by laws, it\u2019s critical to: choose the right <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">storage strategy<\/a>, remember that even <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/\" target=\"_blank\" rel=\"noopener nofollow\">cold wallets can be hacked into<\/a>, and take every <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">measure to secure your wallets, private keys and seed phrases<\/a>.<\/p>\n<p>However, even those who\u2019ve <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">covered all bases<\/a>, installed a <a href=\"https:\/\/www.kaspersky.co.uk\/password-manager?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">reliable program for storing passwords and personal data<\/a>, and protected every possible account with <a href=\"https:\/\/www.kaspersky.com\/blog\/best-authenticator-apps-2022\/43261\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>, should think ahead about what they\u2019d do should their smartphone with the authenticator app on it break, get lost or stolen. Reach out for our tips on how to <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup-authenticator-app\/42103\/\" target=\"_blank\" rel=\"noopener nofollow\">back up an authenticator app<\/a>, or try <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-recover-authenticator-app\/41967\/\" target=\"_blank\" rel=\"noopener nofollow\">recovering<\/a> it if you lost your phone before you could make a backup.<\/p>\n<h2>Conclusion<\/h2>\n<p>This is how you build your own personal threat landscape: by reviewing every area of your cyberlife. Sad as this may sound, the last step in creating a threat landscape is making a <a href=\"https:\/\/www.kaspersky.com\/blog\/digital-legacy\/48032\/\" target=\"_blank\" rel=\"noopener nofollow\">digital last-will-and-testament<\/a>.<\/p>\n<p>If you design your own personal security strategy around your own threat landscape, you\u2019ll do it faster and keep things simpler than if you try protecting yourself from everything at once. You\u2019ll naturally need knowledge of cybersecurity and online privacy to succeed at this. <a href=\"https:\/\/www.kaspersky.com\/blog\/subscribe\/\" target=\"_blank\" rel=\"noopener nofollow\">Subscribe to our mailing list<\/a> to get new posts in your mailbox and study the threats that belong in your personal threat landscape. <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Our security solutions<\/a> can help you neutralize these threats, monitor data leaks, and store personal data safely.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.<\/p>\n","protected":false},"author":696,"featured_media":26008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1622,2026,9],"tags":[2672,1111,363,43,97,98,3647,529,131],"class_list":{"0":"post-26007","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"category-tips","10":"tag-tips","11":"tag-2fa","12":"tag-personal-data","13":"tag-privacy","14":"tag-security-2","15":"tag-social-networks","16":"tag-threat-landscape","17":"tag-threats","18":"tag-tips-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/personal-threat-landscape\/26007\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/personal-threat-landscape\/25708\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/personal-threat-landscape\/21128\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/personal-threat-landscape\/10765\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/personal-threat-landscape\/28396\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/personal-threat-landscape\/26398\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/personal-threat-landscape\/28883\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/personal-threat-landscape\/27802\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/personal-threat-landscape\/35331\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/personal-threat-landscape\/11511\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/personal-threat-landscape\/48280\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/personal-threat-landscape\/20689\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/personal-threat-landscape\/21374\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/personal-threat-landscape\/30214\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/personal-threat-landscape\/34011\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/personal-threat-landscape\/28865\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/personal-threat-landscape\/26300\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/personal-threat-landscape\/32018\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/personal-threat-landscape\/31704\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/26007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=26007"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/26007\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/26008"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=26007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=26007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=26007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}