Social Engineering Expert Quoted in CSO Article
Quoted from the original CSO Online story: Social engineering stories: The sequel Two more social engineering scenarios demonstrate how hackers still use basic techniques to gain unauthorized access,...
View ArticleIdentity Theft Expert John Sileo on 60 Minutes
During a recent 60 Minutes interview, I was asked off camera to name the Achilles’ heel of an entire country’s data security perspective; what exactly were the country’s greatest weaknesses. The...
View Article7 Steps to Secure Profitable Business Data (Part I)
Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, Sony PlayStation Network, Citigroup,...
View Article7 Steps to Secure Profitable Business Data (Part II)
In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the...
View ArticleTwitter Hack Reminds Us That David Can Still Fell Goliath
.avia-image-container.av-n8xlyu-eaae169fcf49efd7deb1e4872b16245c .av-image-caption-overlay-center{ color:#ffffff; } The twitter hack began as a quiet scheme to steal and sell unusual user names, which...
View Article
More Pages to Explore .....