What Is Social Engineering?

social-engineeringThis should really be called “anti-social” engineering.  A good definition is “social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.”

My article on Wednesday will give an example of phone based social engineering – the fake tech support call. ...

Continue Reading →
0

Business Cybersecurity Resolutions

newyear2016As we approach the new year it is traditional to make our New Year’s Resolutions.  Unfortunately, most resolutions are made but not kept, so I am a little reluctant to offer these ideas for improving your cybersecurity in the coming year.  But if you have not climbed on the cybersecurity bandwagon yet, you are definitely overdue. Pick a few of these ideas to implement in your business.

 

Here they are:

  • Stay informed about ...
Continue Reading →
0

Getting Employees Involved In Cybersecurity

teamworkThis week we have focused on the people part of the security puzzle.  As we know, people are the weakest link and the easiest point of access.  But beating this point into your employees will not help them be better at computer and network security, and just make them feel hopeless and badgered.

Getting employee buy-in requires a little bit of strategy mixed in with a lot of fun.

  • Sharing the actual ...
Continue Reading →
0

The Human Factor

employee_trainingOn Monday we discussed the effect that living in a code yellow world has on creating security fatigue.  Peter Herzog, in his blog Dark Matters expanded on this theme recently, giving examples of how teaching your employees how to stay secure in an insecure world may be counter-intuitive to the way we usually accomplish this.

Here are his recommendations:

  • Teach your employees to say “I don’t ...
Continue Reading →
0

Creating a Cybersecurity Policy

cybersecurityOne of the early steps a small business needs to undertake is the creation of a cybersecurity policy.  This is not a trivial undertaking, and taking a look at the information below will undoubtedly make this project look daunting to the average small business owner.  A good solution would be to find a cybersecurity professional with experience in policy creation ...

Continue Reading →
0

Cybersecurity Pros Train Free at Cybrary

cybraryInformation technology certification has always been a daunting proposition.  The books and study materials are expensive, and classroom training is expensive, and the exams themselves are not cheap either.  Couple these costs with the time it takes to study, prepared, and test, time that can’t be billed to a client, and therefore hits your bottom line.

Finally, some good news for cybersecurity professionals, and those that would like to be: ...

Continue Reading →
0
Page 14 of 14 «...1011121314