Category: psychology

  • Be Digitally hack-proof

    Be Digitally hack-proof

    Why do people hack systems? Hacking is a technique used to compromise any digital device. Hackers want to get into your device to use your data for varied reasons – naturally, most of these motives are financially driven.

    A data breach is usually what leads to a hack. There is a difference even though both terms are used interchangeably.

    A data breach happens when data that is left vulnerable in an unsecured environment gets viewed by someone who shouldn’t have access to it.

    While hacks are the result of malicious behavior, breaches happen as a result of negligence, human error, or other non-malicious behavior that creates a security vulnerability.

    Hackers may access your device just to say they could or for financial gain, to protest, or to gather sensitive information.

    So what makes a hacker?

    In the past, a hacker may have been a whiz kid or specialized programmer but in the modern-day, hacking has become easier and more people are becoming hackers. As more people shop online and use computers for everyday tasks, they become the prey of hackers worldwide.

    Actual hacking is technical in nature – the hacker does not communicate with the person whose PC they are hacking into.

    But they can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics are referred to as social engineering.

    Your cellphone too can be hacked

    While most associate hacking with Windows computers, the Android operating system also offers an inviting target for hackers. That means millions of people who use Samsung phones can be hacked.

    Some fifty years ago, there was a name for hackers who obsessively explored low-tech methods for getting around the secure telecommunication networks and expensive long-distance calls. they were called phreaks.

    This was a portmanteau of the words phone and freaks. They were a defined subculture in the 1970s, and their activity was called phreaking.

    Phreakers have now evolved out of the ‘analog technology era’ to become hackers in the digital world. They are beyond a sub-culture and have become a genuine threat to the safety of our information and data.

    Mobile phone hackers currently use a variety of methods to access your mobile phone and can intercept phone calls, voicemails, text messages, and even the phone’s microphone and camera, all without your permission or even knowledge.

    iPhones are not safe either

    In 2020, many journalists working for Al Jazeera were victims of a sophisticated zero-click spyware attack.

    The Toronto-based internet watchdog group Citizen Lab was asked to look into the attacks, which took place in July and August, and they released their findings at the end of December.

    The report found that 36 journalists, producers, anchors, and executives had their iPhones compromised by Pegasus spyware. The spyware, developed and sold by an Israeli-based firm called NSO Group, targets security vulnerabilities in the iMessage app.

    The so-called “zero-click” exploit deploys without any user interaction. Once installed, it can record ambient sound and phone conversations, take pictures, and access user credentials. It sounds like science fiction but it’s very much real!

    Types of hacks

    Malware

    People can use hardware to sneak malware into your PC. In offices, hackers will infiltrate networks by giving staff members infected USB sticks, dodgy USB cables, and mouse chords.

    It is crucial to always think before plugging anything into your work or personal device with access to confidential data.

    Educate your staff about being careful before plugging anything into their PCs.

    Malware infections generally occur when users interact with dangerous code by clicking on a URL or downloading malicious software disguised as an authentic program. But zero-click spyware penetrates devices without any user interaction.

    Citizen recommends making sure that your mobile OS is updated to the latest version. Identified vulnerabilities in previous versions of iOS were patched in the iOS 14 update.

    Practicing good digital hygiene is always important for the security of your mobile devices.

    Use sites like haveibeenpwned.com and breachalarm.com to see if your email credentials have been compromised. Use strong passwords on any apps that contain sensitive data and delete any apps that you do not regularly use.

    Missing security patches

    Always remember to update your security tools. Too many people ignore update notifications or security patches, leaving themselves vulnerable. It’s not just antivirus software that needs patching.

    Tell your staff to ensure that all their antivirus and applications are routinely updated as security patches become available. This task is usually the job of your IT department if you have one in the first place.

    Getting your password information

    Hackers can obtain your credentials through several means, but commonly they do so through a practice called keystroke logging or keylogging.

    Can you believe that the most common password is “123456”? Hopefully, yours isn’t so, or any of the most hacked passwords in the last 10 years.

    Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

    This and other forms of spyware are malware that tracks your activity until a hacker has what they need to break into your system.

    Attackers can deploy malware on a user’s machine if they are in your environment and capture your credentials via keylogging too.

    Hackers also use password cracking programs that can run letter and character combinations, guessing passwords in a matter of minutes, or even seconds.

    To get around this, use a password management tool that securely houses your company’s credentials. These tools can often auto-generate lengthy, diverse character passwords that are difficult for hackers to guess. They can also autofill for your employees for easy access to their tools.

    Encryption and multi-factor authentication methods also offer more layers of protection.

    Distributed Denial-of-Service (DDoS)

    Acunetix

    This technique involves taking down a website so that a user cannot access it or deliver their service. DoS attacks take place when hackers inundate a target’s server with large influxes of traffic. The amount is so frequent and high that it overloads the server by giving it more requests than it can handle. This crashes your server and your company’s website.

    Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is a synchronized attack on more than one server or website, potentially taking down numerous online assets. 

    A good method to fight DDoS attacks is to use cloud protection services to spot them – like Acunetix or Netsparker.

    Social Engineering & Phishing

    This is where hackers try to get your personal information, often by impersonating a legitimate and maybe trusted source.

    Many types of social engineering bait come in the form of phishing emails.

    A hacker sends you a message that looks like it’s from someone you know, asking you to do something, like wire them money, or to click or download an infected attachment to see more. 

    Here is a hilarious example of a phishing Email

    “The top malicious email attachment types are .doc and .dot which make up 37%. The next highest is .exe at 19.5%,” according to a report by Symantec. Always be cautious of opening these types of attachments.

    Warn your employees to never give out private business information over email, to think before opening any attachments, and educate them on mail scams.

    Use email software that scans for phishing. Microsoft 365 and Google’s Business packages come equipped with such. Google’s tech uses AI to scan the content and find things such as spelling errors and dodgy URLs. This enables the system to block them before they even hit your inbox.

    Most people or companies that get hacked or suffer from a data breach do so mainly due to negligence. Many do not prioritize beefing up their security systems before it is too late. Hacks are, however, completely avoidable so don’t fall victim to them.

    Other ways to protect yourself

    • Download a reliable anti-malware product that can both detect and neutralize malware and block connections to malicious phishing websites.
    • Of course, whether you are on Windows, Android, a Mac, an iPhone, or in a business network, you must always use layered protection wherever you can.
    • Only download phone apps from the legitimate marketplaces that police themselves for malware-carrying apps, such as Google Play and the Apple/Amazon Appstore.
    • Check the ratings and reviews first. If it has a low rating and barely any downloads, it might be best to avoid that app.
    • Use long and complex passwords. Don’t use numbers in sequence. You can also use mixes of letters that can be remembered through rhymes.
    • Consider using a password manager.
    Advert
  • Accountable Supervision

    Accountable Supervision

    Leadership values are not only confined to the running of a political campaign, party, or country for that matter, however, like in any venture that has an objective and deals with human beings – it forms the backbone of a successful business.

    Consequently, what leaders such as CEO of Tesla Elon Musk, for example, say or does, have a positive or, in the recent unfortunate case, a negative impact on the shareholdings of his business.


    The share price can decline sharply and worse yet, it can lead to the exit of senior staff members and thus undermining the business, its leadership values, and objectives.


    This why it is critical for companies to adopt the right practices and responsible leadership to enable them to address both internal and external issues affecting them.


    This is even most relevant when dealing with a company that has a multinational operational facet such as the Murray and Roberts Group – a South African company that operates in a global setting.


    This specific multinational company was used in a case study for a research paper because it is firmly entrenched in the construction and engineering industry.


    More specifically, they service the global natural resources market sectors of underground mining; Oil & Gas; Power & Energy.
    Such a diverse set of operations requires a varied set of objectives spearheaded by a solid leadership path.

    A new model of leadership

    We have covered the topic of Emotional Intelligence before. It now surfaces again within a brand-new leadership model known as the ARCHES model.
    The name derives from a key characteristic of the physical structure of an arch and its durability.

    Coupled with its diversity in models and materials and its depiction as symbols of triumph, it represents an apt analogy of what responsible and effective leadership should be.


    The model was especially derived by an academic* for a syndicate group assignment and is based on six key characteristics that should be imparted in a leader.


    An effective and responsible leader is one who is attuned to their followers, responsive, possesses the necessary competencies, serves with humility, is ethical and adopts a sustainable approach to leadership.

    A leader who possesses all these attributes is one who can rise above adversity and lead their followers in a way that promotes innovation, motivates, develops skills, promotes personal growth, and encourages improved performance.

    B.Moyo

    Application of the model

    ARCHES

    The model defines attuned leadership as the act of being self-aware, informed, and aware of the environment in which you exist – servant leadership.


    Employees should be encouraged to take responsibility for their actions because responsibility and effectiveness are complimentary. The demise of US energy company Enron, for example, was due to a failure of management to execute communication-based responsibility, internally and externally.

    A volatile, uncertain, complex, and ambiguous environment in which a business operates can result in many potential projects not coming to fruition.


    In such an environment, leaders that are attuned, responsive, and possess the right competencies can expert power as their way to influence followers to exhibit the same traits.


    Referent power develops out of admiration of another and a desire to be like them. Expert power, on the other hand, is a person’s ability to influence others’ behaviour because of recognized knowledge, skills, or abilities.
    This requires the leader to have a tolerable level of humility.

    This is defined as a personal quality reflecting the willingness to understand the self (identities, strengths, and limitations). That combined with a purpose in the self’s relationship with others.


    Once again, the emphasis on Emotional Intelligence coupled with traditional leadership competencies is needed to steer multifaceted companies.

    Even more so when dealing with diverse cultures and work ethics across borders and continents.

    Direct consequences

    Being the largest employer in the locality directly implied that Murray and Roberts had to be consistent with the idiomatic Zulu expression of “Umuntu ngumuntu ngabantu”. This means: I am because you are, you are because we are.
    Good leadership in the Ubuntu philosophy is based on the engagement with communities and defines a well-led organization.


    Not paying attention to ethical issues surrounding a community or the environment can have an adverse effect on your values. This would also affect your staff and the image of the company you steer.


    A bitter consequence of the failure of ethics was evident in the $4.2m (64.1 million ZAR) fine to the said company. This was for its involvement in sector collusion related to construction projects for the 2010 World Cup.

    Concluding remarks

    Finally, a practical leader will also consider any upcoming projects with the lens of understanding the environment that surrounds them to incorporate the concept of sustainability.


    These traits might sound like they need to be learned but most should be already ingrained or come naturally to you or your leaders.

    If not this is not the case, you need to quickly install the right personnel with such to help steer your business enterprise or economy for that matter, to success.

    *This blog post contains excerpts and is derived from a master’s research paper. It was conducted by Bonnie Moyo for the Rhodes University Business School.


  • Can’t Get No Satisfaction

    Can’t Get No Satisfaction

    In economic terminology, the term “utility” has not much to do with multifunctionality nor completing specific useful tasks.

    It does in context, relate to the level of satisfaction or “completeness” one derives from the consumption of a product or service. For example, there is only so much pizza you can eat before feeling ill from satiety.


    On a broader and more macroeconomics spectrum, our utility levels will also help determine how resources are allocated and consumed.

    Definition

    The concept, a brainchild of Daniel Bernoulli, has so many relevant connotations. As humans, we individually have a maximum biological boundary which when reached, signals absolute satisfaction. This in economic terms is called maximum (total) utility.

    Total utility is the complete satisfaction that you can get from consuming all units of a specific item.


    Economists are more interested in the changes in levels of utility or what is referred to as the marginal utility.

    We will return to its application to the economy.

    Applying utility

    N26_banner-160x600-EN

    Incidentally, the utility has no formal unit of measurement – though we coined the term “utils”. These so-called utils equate a number to utility levels in a controlled sample experiment.


    Understandably it can be quite a feat to quantify utility as it is based on human behavioural preferences. The closest we got to quantifying such was via the marketing concept of the consumer black box.


    As an illustration, the concept can be applied to something as basic as eating a delicious meal.


    Depending on how hungry you were, you would derive the highest utility from the first few bites of your meal.


    As you progressed and depending on your appetite, each additional fork/ spoon, or handful would provide fewer levels of satisfaction. As you reach your stomach’s capacity (towards satiety) your utility diminishes.

    This can be applied to the taste of the meal. It specifically explains why we tend to eat something sweet after a main (savoury) meal.

    The appreciation of ice cream when you are starving would diminish quickly as you concentrate on filling up your stomach. This as opposed to enjoying the taste.

    When compared to the running of an economy, governments and policymakers can determine which goods and services yield the most utility.


    This helps them to consequently direct expenditure to identified priority areas (products/services).

    It is a long term concept

    Education, for instance, may not provide immediate utility (gratification) for scholars and pupils. However, when appropriately harnessed, could yield higher levels of satisfaction. This is when you enter the job market with better remuneration packages.


    Tweaking education curricula, taking into consideration levels of utility to whip up your interest for the good or service. This should, therefore, be a prime focus for legislators.


    Inputs such as maximum times you can concentrate and the length of study for a course should be offered without compromising the substance.


    Without a doubt, there would be considerations, at a micro-level to assist in enhancing both marginal and total utility in the education sector.

    Read more about fiscal policy and budgets here

    More life-related uses

    The concept of utility is a lot less ubiquitous as we think and relates to the unsavoury phenomenon of megalomania and why there is greed.
    When levels of self-gratification diminish quickly, it takes longer for those with lower levels of marginal utility to reach a plateau of pleasure.


    Drug addiction, sexual appetites, and fetishes would then kick-in. In such cases, people upgrade the “product or service” that they have already maximized utility in. At that stage, another level of fulfillment would be sought.

    The utility applied to finances

    120x600

    It also explains why you lose a lot of money gambling or investing in stocks. The satisfaction of gaining more for a little outlay will often drive you to take more risk until a level of risk aversion kicks in.


    High-risk investors “called whales”  are now delving into the Crypto market to maximize their utility. They are diverting their funds from property and stocks into digital currencies like Bitcoin and Ethereum.


    The saying too much of a good thing is inevitably bad for you applies. It can be countered by diversifying the things that deliver pleasure or satisfaction to you.


    This is to ensure that you do not maximize utility on them too quickly and lose interest.  Worse case, you end up delving into the dangerous territories of addiction.


    Economists need to be relevant, more than ever before. They also need to formulate a means to measure and quantify utility or provide “utils” for at least, the most common goods and services.

    With such a strategy, policy-making, product pricing, and the efficient allocation of resources would be more effortless.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.