Cryptoviral Extortion: Commonly known as ransomware. This form of malware attack blocks access to your computer or encrypts data on it unless you pay ransom, almost always in cryptocurrency. An email attachment that users click is the traditional method for spreading ransomware. In addition to having antivirus software, ignoring attachments from unknown parties is the best way to protect against ransomware, says tech guru Shelly Palmer.
Internet of Behavior: Data gathered as people interact with Internet of Things devices, such as mobile phones, smart voice assistants, laptops and fitness trackers. Behavioral scientists analyze this ‘digital dust,’ compiling profiles describing users’ interests, preferences and behavior. Having these insights should greatly inform a company’s crisis planning and response.
Subscribe to PRNEWS for unlimited access to all digital intelligence, exclusive reports and more. Learn More.
Access to all Crisis Insider articles, quarterly reports and valuable blueprints for crisis management.
Per Month Lowest Price
Unlimited access to all Premium and Crisis Insider articles and monthly reports.
First Year Offer
Already a subscriber?