A. You’ve got plenty to worry about! You don’t have to be big, just available. The principal goal of most cyber-attacks is to plant malicious software (malware) on any available computer. The most common “vector” for this infection is through “Social Engineering” (More on this later). Once in place these hackers can:
A. Plenty. Add up the potential losses from:
A. Not by a long shot. Today’s hackers use “zero day” attacks to take advantage of security holes before Microsoft, Apple, Android and antivirus publishers can catch up and send out security updates.
A. No, look out for:
A. Stop using the Internet! Or if that’s not practical, stay vigilant and follow these best practices of IT Security Awareness: