Cybersecurity Checklist for Political Campaigns

Cybersecurity Checklist for Political Campaigns

Campaign adversaries have taken advantage of such capabilities quite frequently; they’ve also exploited unpatched vulnerabilities in the software to infect computers. Resisting such attacks involves being mindful what information you share, how, and with whom:

Many of the attack tactics involved elements of social engineering–persuasion tactics that take advantage of human psychology to trick victims into taking actions that have aided the adversaries. To resist social engineering, be skeptical of any email or chat messages that demand an urgent action or that ask you to click on links or open attachments:

Campaign adversaries used several approaches to intercept network communications of victim organizations, which allowed them to steal login credentials, sensitive documents, and private communication details.

Source: zeltser.com