# C Y B E R A K U T E N - Q & A
HOW CAN I RECOGNIZE AN AI SCAM ?
AI scams often include highly personalised or realistic messages . Look for urgency , unusual requests , or grammatical errors . Verify the source independently before taking any action .
HOW CAN VULNERABILITIES IN HARDWARE OR SOFTWARE BE IDENTIFIED ?
Consider using vulnerability assessment tools or hiring professionals to conduct thorough penetration testing . Regular updates and timely patches can effectively address known vulnerabilities , enhancing your security . The ISSUES project and our dedicated experts at Centria are here to support you .
WHAT TO DO IF I REALIZE THAT I AM ATTACKED ?
If you suspect a cyberattack , immediately isolate the device by disconnecting it from the network to prevent the attack from spreading . Run updated antivirus software if possible , and document any suspicious activity . If unsure or unable to resolve the issue , contact cybersecurity professionals for assistance .
WHAT TO DO IF I HAVE SUBMITTED DETAILS TO A PHISHING EMAIL ?
For your ( and your organisations ) security , please change your passwords for any accounts you have shared information about and enable multi-factor authentication . Monitor your accounts for unusual activity and inform relevant parties like your bank or IT support . These actions will help protect your information .
Q & A R E P O R T 2 0 2 4