Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.
Originally published in Journal of Cyber Policy.
Excerpt:
“As a cybersecurity professional, I know how easy it is for threat actors to purchase “Fullz,” full sets of personally identifiable information (PII). They can get thousands of records as easily as buying milk at the store. It’s just a matter of time before each of our tickets gets pulled and someone decides to act on the information to wreck our good names.
What I didn’t know though, was how I’d feel about it when it happened. And I was ticked”
Read the full article here.