Clark Computer Services

Chuck’s Cyber Wall – Now You Know Cyber Attacks are Personal

Cyber Attacks are personal

Chuck's Cyber Wall

Most people don’t think cyber attacks are personal – until it happens to them. Today Darren asked me if I had requested a change to my direct deposit information. I had not, so he forwarded me an email where hackers spoofed my name to steal my paycheck.

Cyber Attacks Are Personal | Chuck's Cyber Wall | Cyber Attacks Are Personal | Chuck's Cyber Wall | Chuck's Cyber Wall: Cyber Attacks are Personal image of a bot in front of code.

I felt many things at that moment, anger stood out among them, but mostly I felt worried. A cybercriminal targeted me. They were trying to steal from me. I know that most cyberattacks are opportunistic, but this felt personal.

There’s a good reason I felt that way, cyberattacks are personal.

These criminals use bots instead of guns and wear the anonymity of the internet instead of a mask. It doesn’t matter whether they’re holding you up in an alley or holding your data for ransom – they’re trying to steal from you. What’s worse is that the digital world is their home turf, and for most people, they have the home-field advantage.

But that doesn’t mean we’re defenseless.


When you look around, you’ll see that cybercrime generates plenty of headlines. Data breaches and hacks on government and large corporations feel very far from us. Ransomware attacks, for example, feel like something that happens only to organizations, but that’s because attacks on individuals aren’t typically reported in the news. So long as we perceive these attacks as happening only to entities and not people, they’re easy to ignore.

The problem is that cybercrime isn’t just something that happens to big businesses and national governments. The average person is just as much a target. And where these organizations have a dedicated cybersecurity team to secure their computers and devices, we’re on our own.

Unfortunately, that means there are millions of vulnerable targets for data theft, identity fraud, ransomware, and more. This is the reality of the cyber threat environment in which we live.


Because cyber threats are something people hear about but can’t identify with, most are unaware of the risks. A big reason for this is the portrayal of cybercriminals as these hooded figures typing furiously at their computer, but these only exist in Hollywood. The vast majority of cyberattacks are automated. Software programs that search for vulnerabilities in devices connected to the internet, called bots, are a cybercriminal’s preferred weapon.

Think about it, how many devices in your house connect to the internet? Computer. Mobile phone. Security system. Refrigerator. Do you even know? Each one is a potential vulnerability. If you haven’t taken steps to secure them, any one of them could be the gateway an automated bot uses to get into your home network. No hacker furiously typing at their computer required.

Being unaware of what devices and software reside on your network is like walking into a blind alley in an unfamiliar neighborhood. It only takes one opportunistic criminal there waiting to make you a victim.

Cyber Attacks Are Personal | Chuck's Cyber Wall | Cyber Attacks Are Personal | Chuck's Cyber Wall | Chuck's Cyber Wall: Cyber Attacks are Personal person frustrated after being attacked.


Cyberattacks run the gambit from data theft to devastating ransomware attacks. When a large organization is under fire, they have the resources to fight back and recover. The vast majority of individuals rarely even know they’ve been attacked until it’s too late. And then there isn’t any backup. If your computer gets encrypted with ransomware or your bank account gets drained, you’re on your own.

Phishing scams, unpatched software, and social engineering on sites like Facebook, Twitter, and TikTok have become increasingly popular. Attackers don’t just want your information – they want information on your friends and family too. Every piece of personal data has value on the dark web, and the more they get, the more effective they can make their scams.

So while you’re struggling to recover from the attack, cybercriminals might be gearing up to put your loved ones through the same thing.


The first thing to do is get into the mindset that cyberattacks can happen to anyone and that they are personal. No one under attack should just sit back and take it. Being aware of the potential allows you to mount a defense. In this case, a solid antivirus program, running security updates, and watching for scams is the best way to get started.

Cyber Attacks Are Personal | Chuck's Cyber Wall | Cyber Attacks Are Personal | Chuck's Cyber Wall | Chuck's Cyber Wall: Cyber Attacks are Personal image of person typing on a secured laptop.

It’s important to know where your vulnerabilities lie. You should have a list of every device in your home that can access the internet. A huge mistake people make is not changing default passwords – that should be the first thing you do. And use strong passwords. P@$$w0rd1324 is not a clever or strong password. A strong password is a twelve (12) to sixteen (16) character phrase that includes made-up words personal to you and is easy to remember, so you don’t have to write it down.

Lastly, be careful where you click. Don’t fall for phishing emails that promise something too good to be true or make threats to create a false sense of urgency. Look at the “from” address on emails and if something doesn’t feel right, pick up the phone and call. Don’t click on links or download attachments you’re not expecting.

Doing these things will help defend against the cybercriminal’s favorite weapons and, in turn, make your little corner of the cyber world a lot safer.


Cyber criminals don’t target people, they target vulnerabilities with automated attacks. So the only way to keep yourself safe is to be cyber aware! We’re cybersecurity experts, if you want help installing a good antivirus, choosing a password manager, or just figuring out where to start, we can help. Contact us at 301-456-6931 or send an email to for a free quote.

5 1 vote
Rate This Post
Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x