Your Phone’s Betrayal

Your Phone’s Betrayal

Look at your phone and ask yourself, do you rely on that tiny device for your business dealings? Your important family notifications? Your link to the outside world? If the answer to any of these is “yes” then it is critical you be aware of the rise in phone porting ... Read More
When Training Does Not Equal Security

When Training Does Not Equal Security

For many organizations computer security training does not appear to impact the user population in a manner that protects the company assets and confidential data as intended. It is a tough balance to deliver enough information to explain the organization’s security stance, and have it succinct enough to be retained ... Read More
Are You Being Vigilant Against a Dumpster Diving Attack?

Are You Being Vigilant Against a Dumpster Diving Attack?

When one thinks of Open Source Intelligence (OSINT) things like Facebook, court records, and Google-fu typically come to mind. However, a skilled reconnoiter will also utilize the contents of your trash when looking for information. Fraudsters can use information found in a dumpster to find vendor lists, quotes, customer information, ... Read More
Loading...