* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/category/cybersecurity-2/) * Cybersecurity and Electio... # Cybersecurity and Election Time: How to Avoid Being a Victim [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F10%2Fcybersecurity-and-election-time-how-to-avoid-being-a-victim%2F) [](https://twitter.com/share?text=Cybersecurity+and+Election+Time%3A+How+to+Avoid+Being+a+Victim&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F10%2Fcybersecurity-and-election-time-how-to-avoid-being-a-victim%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F10%2Fcybersecurity-and-election-time-how-to-avoid-being-a-victim%2F&title=Cybersecurity+and+Election+Time%3A+How+to+Avoid+Being+a+Victim&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2016/10/cybersecurity-and-election-time-how-to-avoid-being-a-victim/&ts=markdown) \[\](mailto:?subject=Cybersecurity and Election Time: How to Avoid Being a Victim) Link copied By [Stephanie Johnson](https://www.paloaltonetworks.com/blog/author/stephanie-johnson/?ts=markdown "Posts by Stephanie Johnson") Oct 12, 2016 4 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) [election](https://www.paloaltonetworks.com/blog/tag/election/?ts=markdown) The 2016 U.S. Presidential Election is a global phenomenon. But candidates aren't the only ones vying to *connect*with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own criminal agendas. What exactly motivates a cyberattacker to take advantage of elections? * **Traditional cybercrime:** The primary motive behind a cybercrime or attack is financial gain and is carried out by leveraging stolen data. [Security reporter Brian Krebs has published several excellent articles on how cybercriminals monetize stolen data.](http://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/) This is exactly the type of data being asked for during the election time period by a number of interest groups. * **Cyber hacktivism:** Hacktivist-driven attacks are motivated by ideological differences. The goal here is not financial gain. Rather, hacktivists focus largely on persuasion or dissuasion to shift, stop or silence a political group or message. The election also presents a unique opportunity for cybercriminals to tailor their attack methods, based on political campaigns, platforms and candidates. Employing manipulative social engineering lures, cybercriminals often target the weakest link in a security system -- the users -- to accomplish their politically fueled goals. Common social engineering tactics that today's stealthy cybercriminals use include [ransomware](https://www.paloaltonetworks.com/resources/info-insights/what-is-ransomware), [phishing](https://www.paloaltonetworks.com/resources/info-insights/what-is-phishing-attack), spear phishing, watering hole attacks, social networking attacks and more. Here are some ways an attacker might use social engineering based on political interest to trick a user into granting unlawful network access: * Via email or Twitter, by sending a direct message claiming the recipient has won a prize in return for signing a political petition; recipient must provide credit card information to receive the gift. * Unrequested emails prompting password changes or updates to private political groups on the internet or social media channels. * Attempt to convince the recipient to open an email attachment that contains malware by claiming the attachment contains critical information pertaining to his or her favored political party. * Via an email message that claims there is a problem with one of the political groups he or she belongs to on Facebook, which can include a link to a mock web page where login credentials are required to resolve the issue. The fake site delivers the information directly to the cybercriminal to use or distribute as needed. The digital political arena is rife with malicious cybercriminal activity, and the commitment and level of sophistication will only continue to rise. So just what can you do to protect your valuable data and prevent falling victim to these stealthy attempts? ### Don't Get Phished Following are five best practices to protect yourself from stealthy phishing and other social engineering attempts: 1. \*\*Think before you click.\*\*Never click embedded links within an email, especially if you aren't absolutely certain of the sender's authenticity. Although a URL in an email may look authentic, oftentimes, cybercriminals mask the true destination. Instead, open a new browser window and type the URL directly into the address bar to confirm the address. 2. \*\*Watch out for scare tactics.\*\*Phishers often employ scare tactics, threatening to disable an account or delay services until new or updated information is provided. Don't fall for it. Legitimate organizations, particularly those in the political and financial markets, will never request sensitive information via email. 3. \*\*Ignore unprofessional emails.\*\*Emails containing noticeable levels of typos and misspellings are often telltale signs of a phishing attempt. Similarly, fraudulent emails are often personalized and addressed directly to the individual; while real, authentic emails from political groups, financial organizations or other similar businesses, will typically reference the specific details of a given transaction or account. 4. \*\*Go directly to the source.\*\*Always be wary of emails requesting confidential information, particularly requests leveraging an embedded form. (Forms allow malicious senders to track all information entered.) If you do receive an email of this kind, open a new browser window and go directly to the intended source, or pick up the phone and verify the request. 5. \*\*Beef up security.\*\*Block these attempts from ever entering the network in the first place with an automated, prevention-first, platform approach to cybersecurity. In cybersecurity, especially in the political context, architecture matters. With the right architecture in place, political teams or organizations -- security architects, network admins, executives and board members -- should work together to ensure individuals, employees and political allies understand they are active targets for cyberattacks and set expectations for secure behavior, policy compliance, and follow-through with frequent and recurring communications. To learn more about cybersecurity best practices and how Palo Alto Networks Next-Generation Security Platform can prevent successful security breaches and keep your mission-critical data protected, visit the [Palo Alto Networks website.](https://www.paloaltonetworks.com/products/designing-for-prevention/security-platform) Rock the Vote! ~Stephanie ([@Stephyjay23](https://twitter.com/stephyjay23)) *** ** * ** *** ## Related Blogs ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Improving National Security Through Secure AI](https://origin-researchcenter.paloaltonetworks.com/blog/2025/05/improving-national-security-through-secure-ai/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Making Every Dollar Count for Federal Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/2025/03/making-every-dollar-count-federal-cybersecurity/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue](https://origin-researchcenter.paloaltonetworks.com/blog/2018/06/gov-palo-alto-networks-commitment-educating-european-ceos-boards-cybersecurity-business-issue/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Operationalizing the Call for a Cybersecurity Moonshot](https://origin-researchcenter.paloaltonetworks.com/blog/2018/04/gov-operationalizing-call-cybersecurity-moonshot/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) [#### Securing Our Networks with Women in Cyber](https://origin-researchcenter.paloaltonetworks.com/blog/2017/03/securing-networks-women-cyber/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) [#### Madam or Mr. President, Here's How to Keep the Pedal to the Cyber Metal](https://origin-researchcenter.paloaltonetworks.com/blog/2016/11/cso-madam-mr-president-heres-keep-pedal-cyber-metal/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language