Social Engineering Basics – Is Your Business At Risk?
What is Social Engineering? A hacker who uses social engineering effectively preys on people, not technology. A few common practices include: Researching targets on social media to get personal data such as birthdays, addresses, and historical information that may be used to answer security questions. Calling customer service representatives for service providers an individual works […]
Data Doomsday: The Ransomware Call
It’s a Tuesday afternoon, the office is bustling, your servers are down and your tech team is stumped. The phone rings – the call you’ve been dreading. Your data and critical servers have been compromised. The attackers are demanding a hefty fee to undo the damage. It’s a scenario that has played out thousands of […]
BYOD Recharged: 3 Security Challenges to Consider
Security is a critical issue surrounding the BYOD landscape, but the issues have changed a bit in the past few years as the trend has evolved. A few years ago, discussions tended to center around the fact that BYOD was coming and organizations had to start preparing for it. Now it’s here, and it’s time […]
Thinking in the Security Context
What is Thinking in the Security Context? One of the biggest challenges organizations face as they strive to safeguard sensitive information is habituating employees to “thinking in the security context.” This mindset requires workers to be perpetually cognizant that every task they perform, from Internet downloads to paper recycling, has the potential to create corporate […]