PROJECT: ANSWERS TO MAY 2025'S "TODAY'S QUESTION"
- isabels39
- Jun 4
- 6 min read
Updated: Jun 9
PLEASE SHARE THIS PUBLIC DOCUMENT
Specialised Security Services launched the "Today's Question" series as part of our ongoing effort
to help the public prioritise practical and critically important steps in preventing victimisation by crime.
Please see the answers to the questions of May 2025 below.
If you have any questions we can pose on your behalf, do not hesitate to email us:
If you have been a victim of crime, contact Mr. Mike Bolhuis for help from the highly skilled SSS Specialist Investigator Team.

If your cloud storage were breached, what data could be exposed?
A breach in cloud security could expose sensitive or irreplaceable files, including family photos, documents, creative projects, and confidential data.
If these files are not encrypted or backed up locally, the loss could be permanent.
To reduce risk, use strong passwords, activate two-factor authentication, encrypt sensitive files before uploading, and review your sharing settings routinely.
Keep backup copies on secure physical storage devices.

If your phone were lost or stolen, how secure would your personal data be?
The amount of information an unauthorised user can access depends on your phone's security setup.
Without biometric locks, PINs, or password protection, personal messages, photos, contacts, and accounts could be accessed easily.
Even with a lock screen, risks remain if encryption, remote wipe features, or two-factor authentication are not enabled.
Always use device encryption, activate biometric security (such as fingerprint or facial recognition), and enable features that allow you to track and wipe the device remotely.
Back up important data regularly.

Could one compromised online account put others at risk?
Yes. Many users reuse passwords or connect multiple services to one email account.
If a single account is breached, attackers may gain access to others, especially if your email account is compromised, since it is often the key to password resets.
Use a unique password for each account, managed through a password manager.
Enable two-factor authentication wherever possible, especially on email and financial accounts.

How easily could someone guess your account security questions?
Security questions that rely on publicly known or easily guessed information, such as a pet's name or a mother's maiden name, can be a vulnerability.
Anyone who knows you or can research you online may guess the answers.
For better protection, create false answers that only you know, and store them securely in a password manager.

If you went missing today, could your family access your passwords to help locate you?
In an emergency, having a secure plan for password access can be critical.
Trusted family members should be able to retrieve your digital records if necessary.
Options include using a password manager with emergency access features, storing a written password list in a locked location, or preparing a digital legacy plan.
This allows loved ones to track devices, access accounts, and assist law enforcement or emergency responders in locating you.

What could someone learn about you from your browsing history?
Browsing history provides detailed insight into your private life.
A malicious actor could infer your interests, health conditions, financial situation, travel plans, political views, and even interpersonal relationships.
To safeguard your privacy, consider using private browsing modes, clearing your history regularly, and using secure networks.
A virtual private network (VPN) adds an extra layer of protection.

What if an old social media post resurfaced and affected your reputation?
An outdated or inappropriate post from years ago could damage your personal or professional standing.
If this occurs, assess the situation calmly.
If necessary, issue a sincere public statement, remove the post, and contact affected parties to explain.
Prevent future issues by reviewing and cleaning up past posts regularly.
Use privacy settings wisely, and think carefully before posting anything that could be misunderstood or controversial.

What if a scammer impersonated you and convinced a family member to send money?
Would your family recognise the red flags in time?
A scammer might contact them urgently, claiming to be you and asking for money through unusual methods.
If your family is not familiar with how you normally communicate or is unaware of common scam tactics, they may fall for it.
Warning signs include messages that are emotionally charged, written in an unfamiliar tone, or requests to transfer funds using unfamiliar or insecure channels.
To reduce this risk, families should agree on a private verification method, such as a code word, and have open conversations about scams.
Encourage your relatives to contact you directly by phone or video call before taking action on any suspicious message.

What could be compromised if your smart home devices were hacked?
Unauthorised access to your smart home system could expose sensitive personal data, compromise your safety, and disrupt your daily routine.
Hackers could view camera feeds, unlock doors, change alarm settings, or gain access to other devices on your home network.
To secure your smart home, regularly update device firmware, use complex passwords, enable network encryption, and avoid default login credentials.
Consider segmenting smart devices onto a separate Wi-Fi network for added protection.

If your email account were locked for ransom, what would you lose access to?
Losing access to your email could disrupt every aspect of your digital life.
Most services, online banking, social media, cloud storage, streaming platforms, and work tools are tied to your email address.
Without access, password resets become impossible, and you risk losing control of multiple accounts.
To protect your email account, use a strong, unique password, enable two-factor authentication, and set up secure backup recovery options.
Consider linking your email account to a trusted secondary email or phone number in case of emergencies.

Would you know if malicious software had been installed on your device after clicking a suspicious link?
Most malware operates discreetly, making it difficult to detect.
It could log your keystrokes, monitor your activity, steal personal data, or alter your system without apparent symptoms.
Some signs include slower device performance or unusual pop-ups, but many infections remain hidden.
Avoid clicking unknown links, keep operating systems and antivirus software up to date, and install only trusted applications.
Use a reputable anti-malware tool to scan your device regularly.
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.
Comments