Social Engineering: Eight Common Tactics
A refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.
Joan Goodchild | 13 Nov | Read more
A refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.
Joan Goodchild | 13 Nov | Read more
Malware and botnets and phishing, oh my! Symantec's latest report on the Internet threat landscape highlights trends in cybercrime.
Joan Goodchild | 06 Nov | Read more
An e-mail touting the win of Democratic candidate Barack Obama directs users to a doctored election results page.
Joan Goodchild | 06 Nov | Read more
A recent survey finds employees continue to ignore security policies. (Surprise, surprise.) Here's a reminder about what often is missing in organizations that tempts workers to walk the wrong side of security law.
Joan Goodchild | 30 Oct | Read more
New survey results from Sophos find the number of spam emails with dangerous attachments have soared. The report reveals the malicious messages rose eight-fold in just three months.
Joan Goodchild | 30 Oct | Read more
The inside of the Symantec Security Operations Center looks like a scene out of the movie "War Games," and in many ways, the connection is fitting. The SOC, as it is known by Symantec employees, is in the business of detecting and analyzing network threats. And as malicious activity online gets increasingly more sophisticated, the war against cybercrime is definitely on.
Joan Goodchild | 16 Oct | Read more
According to a report from Fox News, several servers at the World Bank Group, an organization that offers economic assistance to developing countries around the globe, were repeatedly compromised and breached over the course of the last year.
Joan Goodchild | 15 Oct | Read more
Shira Rubinoff was a practicing psychologist in 2004. When it came to technology, her experience was simply as a tech user, certainly not a tech guru. Then one day she was phished.
Joan Goodchild | 07 Oct | Read more
As vice president of learning and development for US-based AlliedBarton Security Services, Rich Cordivari is responsible for the training community in the company. That means he oversees 150 trainers who work locally all over the country to deliver education to AlliedBarton employees. Cordivari, who has been with the company since 2003, discusses his strategy for boosting retention rates with programs that speak to the company's diverse geographic accounts, as well as the different generations now working for AlliedBarton.
Joan Goodchild | 18 Sep | Read more
John had a massive challenge to tackle. A former IT security officer at a large bank in New York, he and his wife packed up and moved across the country so he could take on the role of chief security officer with a well-known provider of loans, retail financing, and other credit related products.
Joan Goodchild | 08 Sep | Read more
The final installment in a series of articles about generational differences and security. Part one looked at managing workers in different age groups. Part two examined the types of security concerns that are most commonly associated with different generations in the general workforce. This article provides recruiting and retention advice for security employees.
Joan Goodchild | 27 Aug | Read more
Whether you were born in the swinging sixties or are part of the slacker generation, some security experts say generational social influences can give you bad habits and make you an office liability.
Joan Goodchild | 11 Aug | Read more
A recent survey released by security software firm Symantec found 66 per cent of Millennial employees, those born after 1980, admit to using Web 2.0 technologies, such as Facebook and YouTube, while at work. The same poll found younger workers also regularly store corporate data on personal devices, such as PCs and USB drives.
Joan Goodchild | 11 Aug | Read more
The generation gap. It's a term that has been used for decades to describe the differences between people in various age groups. Corporations are constantly considering what makes different generations tick when it comes to recruiting and retaining employees. But security experts say companies also need to examine age-based perspectives and habits when it comes to risk assessment and policies.
Joan Goodchild | 11 Aug | Read more