The call came unexpectedly one evening. It was an acquaintance and an average user who uses his computer for regular household chores, including online banking, digital payments, and other mundane tasks. He had been enjoying his usual online activities when a page on his screen threatened him with a supposed malware infection and a violation. The only way out, it claimed, was to call Microsoft on a provided number. This tactic was a standard cyber trap, but unfortunately, my acquaintance fell into it.

He dialed the number, and the voice on the other end, feigning urgency, instructed him to download remote software. The agent insisted he stays on the line, and while he was distracted, a shell screensaver started and masked the actual happenings in the background.
Fortunately, he remembered me and placed a call on the other line. As soon as I heard the story, I knew we were dealing with a cyber threat. I advised him to switch off his computer immediately and reboot his modem. We scheduled a thorough check of his computer the next day.

After careful inspection, we found the intruder had combed through his browser to expose his saved passwords. As he was a board member of several organizations, there were a few documents on his computer, although we found no Personal Identifiable Information (PII). To ensure complete safety, we wiped the computer clean, reloaded the laptop, and assisted him in resetting passwords.

This incident drives home three crucial aspects of cybersecurity:

Supply Chain Cyber Attacks:
By using the same or similar passwords across different platforms, an individual or business opens Pandora’s box of cyber threats. Cyber attackers can easily compromise one platform and gain access to all others. As part of Underdog’s commitment to cybersecurity, we encourage a robust, diverse password system to prevent such threats.

BYOD Policy:
Personal devices are often used for professional work, underscoring the importance of an effective BYOD policy. This policy should detail the minimum standards a computer must meet before accessing the organization’s data. With Underdog’s guidance, businesses can effectively implement and enforce a comprehensive BYOD policy.

Good Cyber Hygiene:
Just like maintaining personal hygiene is crucial for our health, maintaining good cyber hygiene is essential for digital safety. By protecting our digital selves, we safeguard others connected to us. Underdog assists businesses in fostering a culture of cyber cleanliness, strengthening their digital fortress.

At Underdog, we go beyond just advocating cybersecurity. We empower businesses with knowledge and tools to safeguard their digital space. By adhering to our core values, we work to demystify technology and transform it from a potential threat into a tool for success.