CYBER RISK DISCLAIMER
This Cyber Risk Disclaimer (“Disclaimer”) is hereby entered into and agreed upon by You (User) and UNBLOK LLC (“Company” or “UNBLOK”). It governs your use of the web pages located at www.unblokapp.com and the mobile application UNBLOK (“App”) (together or individually “Service”) owned and operated by UNBLOK.
By accessing, subscribing and using the Platform, you agree to this Disclaimer. These terms create a binding legal agreement between you and UNBLOK. Please read them carefully. If you do not agree with any of these terms, you should not access, subscribe, and/or use our services. Please note that your use of the Platform constitutes your digital acceptance of this Disclaimer and your agreement to be bound by it.
As the world becomes increasingly reliant on technology, cyber risks have become a major concern. Cyber fraud, data loss, and data breaches are some of the most common cyber risks that internet users face. Cyber fraud occurs when someone uses fraudulent means to obtain sensitive information or financial data. Data loss occurs when data is accidentally or intentionally destroyed or deleted. A data breach is a security incident in which confidential data is accessed without authorization. These risks can have serious consequences for individuals, businesses, and governments. Cyber risks are constantly evolving, and it is important to be aware of the latest threats and how to protect yourself from them.
Cybercriminals are becoming more sophisticated in their methods, and they are targeting both individuals and businesses of all sizes. Cybercriminals are constantly evolving their methods, and they are often one step ahead of the latest security measures. This means that it is important to stay up-to-date on the latest cyber risks and to take steps to protect your data. They can use this information to commit fraud or to sell it on the black market. If you suspect that you have been a victim of cybercrime, it is important to act quickly and to contact the authorities. Cybercrime is a serious threat, and it is important to do everything you can to protect yourself from it.
To protect yourself from cyber risks, you need to be vigilant about online security. Use strong passwords and never reuse them across different accounts. Be careful about clicking on links or opening attachments from unknown sources. And make sure that you have a good antivirus program installed on your computer. By taking these precautions, you can help keep yourself safe from cybercriminals.
1. RISK OF EXPOSURE
You understand and agree that using/sharing content online involves risks of unauthorized disclosure or exposure and that, in submitting your content, data to or transmitting it through the system, you assume these risks. UNBLOK offers no representation, warranty, or guarantee that your data will not be exposed or disclosed through the System or through errors or the actions of third parties.
It is important to be aware of the risks that subsist on the internet and how to minimize them:
a) Exposure to inappropriate material
b) Illegal activities
d) Legal and financial risks
e) Identity theft
g) Invasion of privacy
h) Data breach
- Cyber Security is defined as technologies, processes, procedures and controls that are designed to protect Digital Environments from Cyber Security Incidents;
- Cyber Security Incident is defined as the loss or unauthorized destruction, alteration, disclosure of, access to, or control of a Digital Environment;
- Digital Environment is information technology systems, operational technology systems, networks, internet-enabled applications or devices and the data contained within such systems.
UNBLOK is not liable, and you agree not to hold us responsible for any damages or losses arising out of or in connection with this Disclaimer, including, but not limited to:
- Your use of or your inability to use our Platform or Platform services;
- Delays or disruptions in our Platform or Platform services;
- Viruses or other malicious software incurred by accessing, or linking to our Platform or Platform services;
- Glitches, bugs, errors, or inaccuracies of any kind in our Platform or Platform services;
- Damage to your hardware device from the use of the Platform or Platform services;
- The content, actions, or inactions of third parties’ use of the Platform or Platform services;
- A suspension or other action taken regarding your account.
3. INFORMATION SECURITY EXPERTS
- We regularly consult with our developers and experts if and when urgent issues arise with the Platform or if there are scheduled feature releases or upgrades.
- Our cloud hosting provider will only be asked to access the data in the event the Platform is down or is experiencing server issues.
- We may consult with security experts to ensure continuous Platform safety and compliance.
4. CYBER RISKS
UNBLOK strives to protect Customers against Cyber risks. We have implemented our system with security experts and we use industry best practices security measures to protect our users.
While UNBLOK takes many measures to ensure security, we are not liable for any Cyberattack, damage, or loss on the World Wide Web. You expressly agree and acknowledge that the use of the UNBLOK Platform is at your sole risk. In no event will UNBLOK, UNBLOK professionals or their officers, employees, directors, parents, subsidiaries, affiliates, agents or licensors be liable for any indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss of revenues, profits, goodwill, use data or other intangible losses arising out of or related to your use of the Platform and/or Service.
5. TYPES OF CYBERATTACKS YOU SHOULD BE AWARE OF AND AVOID
- Network security attacks
- Wireless security attacks
- Malware attacks
- Social engineering attacks
- Malware: is a type of application that can perform a variety of malicious tasks – spy on the user in order to obtain credentials or other valuable data or to cause disruption.
- Phishing: is where the attacker tries to trick an unsuspecting victim into handing over valuable information, such as passwords, credit card details, intellectual property, and so on.
- MITM - Man-in-the-middle-attack is where an attacker intercepts the communications between two parties in an attempt to spy on the victims, steal personal information or credentials, or perhaps alter the conversation in some way.
- DDoS – Distributed Denial-of-Service attack – is where an attacker essentially floods a target server with traffic in an attempt to disrupt, and perhaps even bring down the target. A DDoS attack is able to leverage multiple compromised devices to bombard the target with traffic.
- SQL injection: is a type of attack which is specific to SQL databases. The attacker can exploit the HTML form to execute queries that will create, read, modify, or delete the data stored in the database.
- Zero-day exploit: is where cyber-criminals learn of a vulnerability that has been discovered in certain widely-used software applications and operation systems, and then target organizations who are using that software in order to exploit the vulnerability before a fix becomes available.
- DNS tunneling: is a sophisticated attack vector that is designed to provide attackers with persistent access to a given target. Attackers are able to insert or tunnel malware into DNS queries. The malware is used to create a persistent communication channel that most firewalls are unable to detect.
- BEC – Business Email Compromise: is where the attacker targets specific individuals, usually an employee who has the ability to authorize financial transactions, in order to trick into transferring money into an account controlled by the attacker. BEC attacks usually involve planning and research in order to be effective.
- Cryptojacking: is where cyber criminals compromise a user’s computer or device and use it to mine cryptocurrencies, such as Bitcoin. Organizations don’t have great visibility when it comes to this type of attack, which means that a hacker could use valuable network resources to mine a cryptocurrency without the organization having any knowledge of it.
- Drive by Attack: A drive by download’ attack is where an unsuspecting victim visits a website which in turn infects their device with malware. The website in question could be one that is directly controlled by the attacker, or one that has been compromised. In some cases, the malware is served in content such as banners and advertisements.
- Cross-site scripting (XSS) attacks: Cross-site scripting attacks are quite similar to SQL injection attacks, although instead of extracting data from a database, they are typically used to infect other users who visit the Website. It can happen in the comment section on a webpage.
- Password attack: is a type of cyberattack where an attacker tries to guess or cracks a user’s password. Some examples: Brute-force attack, Dictionary attack, Rainbow table attack, Credential stuffing, Password spraying and Keylogger attack.
- Eavesdropping attack: Sometimes referred as “snooping” or “sniffing”, an eavesdropping attack is where the attacker looks for unsecured network communications to intercept and access data that is being sent across the network.
- AI-Powered attack: AI-powered software is able to slave machines to perform a huge DDoS attack. Also, can learn what kinds of approaches work best and adapt their attack methods accordingly. They can use intelligence feeds to quickly identify software vulnerabilities, as well as scan systems themselves for potential vulnerabilities. AI-powered attacks can work around the clock. They are fast, efficient, affordable and adaptable.
- IOT-Based attacks: is a type of attack where an attacker goes through an IOT (internet-of-things) device and exploits targets such as medical devices, security systems, smart thermometers in order to launch large-scale DDoS attacks.
It’s important to note that no system is 100% vulnerability free or “hacker-proof”.
6. BEST PRACTICES TO AVOID DATA BREACH
- Keep track of your banking receipts. The first sign of being compromised is finding strange charges on your account that you did not make.
- Don’t believe everything you see. Social engineering preys on the gullible. Be skeptical and vigilant.
- Be mindful of what you share on social media. Don’t get carried away. If possible, don’t reveal too much about yourself on your profile.
- Secure all your devices. These devices include laptops, mobile devices, and wearables. Ensure that they are protected by security software that is always updated.
- Secure your accounts. Use a different email address and password for each of your accounts. You may opt to use a password manager to automate the process.
- Do not open emails from unfamiliar senders. When in doubt, delete suspicious-looking emails without opening it. Always try to verify who the sender is and the contents of the email before opening any attachment.
7. HARM TO YOUR DEVICES
You understand and agree that you use, access, or otherwise obtain information, materials, assessments, results or data through the Platform or any of the other services or any third-party site at your own discretion and risk and that you will be solely responsible for any damage to your property (including your devices) or loss of data that results from the use of such material or data.
8. EVENTS OUTSIDE OUR CONTROL
UNBLOK will not be liable or responsible for any failure to perform, or delay in performance of, any of our obligations under these Terms that are caused by an Event Outside our Control.
An Event Outside our Control means any act or event beyond our reasonable control, including without limitation strikes, lock-outs or other industrial action by third parties, civil commotion, riot, invasion, terrorist attack or threat of terrorist attack, war whether declared or not or threat or preparation for war, fire, explosion, storm, flood, earthquake, subsidence, epidemic or other natural disaster, or failure of public or private telecommunications networks (“Event Outside our Control”).
If an Event Outside our Control takes place, that affects the performance of our obligations under these Terms:
- We will contact you as soon as reasonably possible to notify you; and
- Our obligations under these Terms will be suspended and the time for performance of our obligations will be extended for the duration of the Event Outside our Control. Where the Event Outside our Control affects our performance of Services to you, we will restart the Services as soon as reasonably possible after the Event Outside our Control is over.
9. CHANGES TO OUR DISCLAIMER
Should we update, amend, or make any changes to this document so they accurately reflect our service and policies. Unless otherwise required by law, those changes will be prominently posted here. Then, if you continue to use the service, you will be bound by the updated Disclaimer.
Questions about this Disclaimer should be sent to us at email@example.com