Probably one of the most interesting incidents I have investigated was the theft of computers from a university. The perpetrator had done a good job scouting out the procedures of the organization, and through his reconnaissance put together a whole deal of information. He knew for instanceHe knew for instance that onHe knew for instance … Continue reading Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc
Category: social engineering
Protecting your organisation from the risk of social engineering
Humans are still the weakest link in cyber security, and they lack training to become aware of the risks. This is a very good example.
Protecting your organisation from CEO fraud
One of the most costly cyber threats/risks is CEO fraud.
Is your organizations data valuable to outside threats?
Whether or not your organizations data as valuable to outsiders depends heavily on what business you're in. Generally said, your organizations data is valuable :period. There is an ever increasing amounts of data being taken from paper, and digitized. Therefore they are not only victim to attempts of corporate espionage, but also to data collection … Continue reading Is your organizations data valuable to outside threats?