The Power of Vishing

The Power of Vishing

Just a couple of years ago, vishing, or voice phishing, was an unknown term. However, vishing is getting more attention […] ... Read More
Social Proof in Social Engineering

Social Proof in Social Engineering

You need a new chair for your desk. You’re looking for features such as arm rest and good back support. […] ... Read More
Across a River

Across A River

As I waded across a river at 2am, I thought to myself… who else’s job entails this? I came into […] ... Read More
Be Prepared for Cybersecurity Awareness Month

Be Prepared for Cybersecurity Awareness Month

As your alarm goes off you roll over and pick up your phone. Turning the alarm off, you check your […] ... Read More
A Human Vulnerability Scan

A Human Vulnerability Scan: The Social Engineering Risk Assessment

Every year companies lose thousands and even millions of dollars due to security breaches. Because of this, corporations may spend […] ... Read More
Vishing breaking down social engineering techniques

Vishing: Breaking Down Social Engineering Techniques

If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ... Read More