Source |
CSO |
Identifiant |
7176031 |
Date de publication |
2022-09-28 02:00:00 (vue: 2022-09-28 10:06:02) |
Titre |
How cybercriminals use public online and offline data to target employees |
Texte |
We post our daily lives to social media and think nothing of making key details about our lives public. We need to reconsider what we share online and how attackers can use this information to target businesses. Your firm's security may be one text message away from a breach.How and why attackers target new employees
For example, a firm onboards a new intern and provides them with keys to the office building, logins to the network, and an email address. It's normal for employees to also have personal email and cellphones. Depending on the size of the firm, if you use multifactor authentication, you also deploy two-factor tokens or applications to their cellphones or provide them with a work phone. The first few days on the job can be hectic, with a lot of new technology to deal with. It can be overwhelming as well as stressful as the eager new hire wants to settle into the job and be accommodating.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
about accommodating address also applications article attackers authentication away breach building businesses can cellphones click cybercriminals daily data days deal depending deploy details eager email employees example factor firm first from full have hectic here hire how information intern job key keys lives logins lot making may media message multifactor need network new normal nothing office offline onboards one online overwhelming personal phone please post provide provides public read reconsider security settle share size social stressful target technology text them think tokens two use wants well what why work your |
Tags |
|
Stories |
|
Notes |
|
Move |
|