One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 1495753
Date de publication 2019-11-04 11:28:45 (vue: 2020-01-03 15:00:04)
Titre NBlog Nov 4 - social engineering awareness
Texte December's awareness topic is one of our regular annual topics. Social engineering has been around for millennia - literally, in the sense that deliberate deception is a survival strategy adopted by many living beings, right back to primordial times.So, what shall we cover this time around? In 2018, the NoticeBored awareness module took a deep dive into phishing, a modern-day scourge ... but definitely not the only form of social engineering, despite what those companies pushing their 'phishing solutions' would have us believe. We picked up on 'business email compromise' as well, another name for spear-phishing. In 2017, we explored 'frauds and scams' in the broad, producing a set of 'scam buster' leaflets explaining common attacks in straightforward terms, illustrated with genuine examples and offering pragmatic advice to avoid falling victim to similar tricks.Back in 2016, the 'protecting people' module covered: social engineering attacks, scams and frauds, such as phishing, spear-phishing and whaling; exploitation of information and people via social media, social networks, social apps and social proofing e.g. fraudulent manipulation of brands and reputations through fake customer feedback, blog comments etc.; the use of pretexts, spoofs, masquerading, psychological manipulation and coercion, the social engineer's tradecraft; and significant information risks involving blended or multimode attacks and insider threats.Although we already have lots of content to draw upon and update, we always aim to cover current threats, which means this week our research phase draws to a close with a clearer idea of the scope of December's module, plus a bunch of recent incidents to illustrate the materials.As to precisely what aspects
Envoyé Oui
Condensat  in 2016 2017 2018 adopted advice aim already although always annual another apps around aspects attacks avoid awareness back been beings believe blended blog brands broad bunch business buster but clearer close coercion comes comments common companies compromise content cover cover current covered: covering customer day december deception deep definitely deliberate despite dive draw draws drop email engineer engineering etc examples explaining exploitation explored fake falling feedback form frauds fraudulent genuine has have here hints idea illustrate illustrated incidents information insider involving leaflets literally living lots manipulation many masquerading materials means media millennia modern module more multimode name nblog networks not noticebored nov offering one only people phase phishing picked plus pragmatic precisely pretexts primordial producing proofing protecting psychological pushing recent regular reputations research right risks scam scams scope scourge sense set shall significant similar social solutions spear spoofs straightforward strategy such survival terms those threats through time times together took topic topics tradecraft; tricks update upon use victim week well whaling; what which would
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: