Enhance Readiness, Resilience, & Recovery

CHALLENGE »  Distinguishing between approved AI processess and social engineering AI  processes attacks are increasingly challenging and sophisticated.  

MINIMIZE RISKS »  

i *  Nanlu.org is not afiliated with any of the external links. Links are provided solely for educational and informational purposes.
»  Defenses  »  Fraud Plan 

TOP
 

  DEFENSE IN DEPTH (  ) * 

Security Options . . .

  User Authentication control
    Yubico MFA2 hardware security key
    Smart Card (option)
   FIDO2 WebAuthn

 

  Compliance Laws (US mandatory protection) 

 

 
TOP
 

  FRAUD PLAN

  • Review banking operations locally at branch, for a safer communication support.  
  • Review fraudulant activities locally with a bank representative.  
    • Fraudster may evasedrop on cell phone activities, emails and intercept phone calls.
  • Review multiple accounts with credit agencies.
TOP
 

THREATS / ATTACKS  (Links)*

 

Informative Resources

TOP

STOP FRAUD     

TOP

MINIMIZE RISKS  ()

  • Do not act on your own when in doubt. 
  • Do not click on any links in email.
  • Use a phishing-resistant MFA authenticator, FIDO with physical security key. 
  • Managing who gets your resources, for how long, and on what devices. 
    (For example: apps, ads, browsers, storage files).
  • Deep cleaning security settings accross all platforms.
  • Restrict extenstions, filters, and blocking.
  • Upskilling in security awarenesses.
  • Authorizing access to need to know only.
  • Giving the least privilege access in mind.