Social Engineering Schemes Target Humans, Not Technology

In the world of cybersecurity, it’s a well-known secret that the weakest links in every cyber defense strategy are humans, not technology. Many times, it’s simpler to blame technology, and then to look to technology to solve the problem.

The post Social Engineering Schemes Target Humans, Not Technology appeared first on Global Knowledge Blog.

Read more

7 Obvious Security Precautions Companies Forget to Take

It seems that even with all the examples of breaches and compromises caused by the lack of company security across the last two decades, organizations continue to move forward with a “same as it ever was” mentality. Organizations aren’t learning from others’ mistakes.

Read more

The Art of Deception: Stories of How We All Get Phished

Are you like most people who associate cyber, cyber security, data breaches and other similar terms with computers and technology? When you hear about a data breach in the news, do you immediately wonder which technical vulnerability was exploited? This is probably the reason why so many companies believe that a breach won’t happen to their company. They believe hackers only exploit technical vulnerabilities and somehow their tools and techniques for securing data are better than everyone else’s. Regardless of the reason, most are ignoring the one weak link in the chain that is more easily exploited than most technical vulnerabilities but much more difficult to mitigate — the end-user. The employee with access to the network is by far a much greater threat than just about any technical vulnerability. One click and your network is compromised.

Read more

When a Friend “Sends” You Junk Email

One of the main weapons of organized crime on the Internet is the use of junk email, also called spam. Hackers use spam for a number of purposes such as selling counterfeit products (medicines, particularly) to steal your personal or financial information, or to infect your computer with spyware and malware. This malicious software can then hijack your computer and your Internet connection to help propagate itself.

Read more