article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. Fraudulent emails purporting to be from authoritative company sources are the main phishing attacks that employees fall victim to. IoT Devices.

IoT 113
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Phishing, pretexting, SMS toll fraud, baiting and tailgating are among the common tactics used by cybercriminals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

No longer confined to isolated malware or phishing attacks, threats now encompass a wide range of sophisticated tactics, techniques, and procedures (TTPs) used by cybercriminals and nation-state actors alike. Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre.

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

I knew that security holes existed for years, but because communications were more commonly B2B, it was not a priority. There was increased concerned for protection of consumer privacy because of the use of cellphones, social media, and other Internet of Things (IoT) technology. This is two words, but they are synonymous to the other.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For modern networks, the introduction of new endpoints – be it remote laptops for personnel or client IoT devices – is a roadblock being actively addressed. Launched in 2017, Mumbai-based Block Armour offers a cybersecurity platform for unifying network access across enterprise and IoT environments. Types of Endpoints Matter.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

Two-factor authentication is also being deployed for mobile security and by Internet of Things companies such as Nest to secure IoT devices. And it’s not hard for them to use social engineering to get around it, or else phishing attacks wouldn’t be so popular. Rise of multi-factor authentication. MFA use cases and considerations.