Social Engineering Basics – Is Your Business At Risk?

What is Social Engineering? A hacker who uses social engineering effectively  preys on people, not technology. A few common practices include: Researching targets on social media to get personal data such as birthdays, addresses,  and historical information that may be used to  answer security questions. Calling customer service representatives for service providers an individual works […]
Read More ›

Data Doomsday: The Ransomware Call

It’s a Tuesday afternoon, the office is bustling, your servers are down and your tech team is stumped. The phone rings – the call you’ve been dreading. Your data and critical servers have been compromised. The attackers are demanding a hefty fee to undo the damage. It’s a scenario that has played out thousands of […]
Read More ›

BYOD Recharged: 3 Security Challenges to Consider

Security is a critical issue surrounding the BYOD landscape, but the issues have changed a bit in the past few years as the trend has evolved. A few years ago, discussions tended to center around the fact that BYOD was coming and organizations had to start preparing for it. Now it’s here, and it’s time […]
Read More ›

Social Spies: How Governments and Companies Use Social Media for Intel

I wrote a year ago about Social Media and identity theft. In that post, I discussed  information leakage and how bad actors could use that for stealing someone’s identity. There are other off-label uses for social media platforms including business competitive analysis, actual spying, and a place for covert operatives to help secure their assumed […]
Read More ›

NIST Wants Comments on Secure Software Development

The US National Institutes of Standards and Technology recently asked for comments on a new framework for secure software development. Called Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF) this framework seeks to aid developers by providing a somewhat universal framework for secure software development. What this framework doesn’t […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.