One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 1495743
Date de publication 2019-12-01 17:44:15 (vue: 2020-01-03 15:00:04)
Titre NBlog December - social engineering awareness module
Texte December 2019 sees the release of our 200th security awareness and training module, this one covering social engineering. The topic was planned to coincide with the end of year holiday period - peak hunting season for social engineers on the prowl, including those portly, bearded gentlemen in red suits, allegedly carrying sacks full of presents down chimneys. Yeah right!I'm fascinated by the paradox at the heart of social engineering. Certain humans threaten our interests by exploiting or harming our information. They are the tricksters, scammers, con-artists and fraudsters who evade our beautiful technological and physical security controls, exploiting the vulnerable underbelly of information security: the people. At the same time, humans are intimately involved in protecting and legitimately exploiting information for beneficial purposes. We depend on our good people to protect us against the bad people.Vigilance is often the only remaining hurdle to be overcome, making security awareness and training crucial to our defense. It's do or die, quite literally in some cases! The module concerns information risks, controls and incidents involving and affecting people:Various types of social engineering attacks, scams, cons and frauds – phishing being just one of many topical examples;Exploitation of information and people via social media, social networks, social apps and social proofing e.g. fraudulent manipulation of brands and reputations through fake customer feedback, blog comments etc.;The social engineer's tradecraft i.e. pretexts, spoofs, masquerading, psychological manipulation and coercion.
Envoyé Oui
Condensat  adversaries  business email compromise  fraudulent  pretexts  the  yeah 200th security 2019 ;the about account accounts adapt affecting against all allegedly aneat apps are artists attacks authorization awareness bad bank bearded beautiful being beneficial better bit blog brands but buy bypassing can carrying cases catching cautious certain chance changing checking chimneys coercion coincide com combining comments etc con concern concerns cons content control controls corporate covering creative crucial cunning customer customize december defense depend developing die doesn dollars don down download due effective electronic emergency end engaging engineer engineering engineers especially evade ever examples;exploitation except exploiting fake fascinated feedback files format frauds frauds specifically targeting fraudsters fraudulent from full gaining gentlemen good greater guard guides hack hacking harder harming heart highly holiday however humans hunting hurdle inan incidents including indiscriminate information installing instance instantly: interests intimately involved involving its just legitimately like literally logo lucrative makes making malware manipulation many masquerading materials meaty media methods millions minor module more most mostly much nblog needs netting networks normal numbers of many topical off office often one only operation organization outsiders overcome paradox patiently payee payments peak penetration people people:various perhaps period phishing physical planned pleased plentyof policy portly presents professionals proofing e protect protecting provided prowl psychological purposes quite ransomware red reducing relatively release remaining reputations requests research respectively reveal right risks sacks same scammers scams season secaware security security: sees set site situation social some sometimes sophisticated specific spoofs stand subtle suit suits swap task techniques technological tens them these those threaten three through time today topic tradecraft i training tricking tricks tricksters trumped trust two types underbelly unknown unusual version vigilance vulnerable wariness what who with the work workforce year your yours
Tags Malware Hack
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: