Remove B2B Remove IoT Remove Phishing Remove Social Engineering
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: What are some of the most common social engineering tactics that cybercriminals use?

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

I knew that security holes existed for years, but because communications were more commonly B2B, it was not a priority. There was increased concerned for protection of consumer privacy because of the use of cellphones, social media, and other Internet of Things (IoT) technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. Fraudulent emails purporting to be from authoritative company sources are the main phishing attacks that employees fall victim to. IoT Devices.

IoT 121
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

No longer confined to isolated malware or phishing attacks, threats now encompass a wide range of sophisticated tactics, techniques, and procedures (TTPs) used by cybercriminals and nation-state actors alike. Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

And social engineering can crack even more considering how many people include the names of their families and birthdays. Two-factor authentication is also being deployed for mobile security and by Internet of Things companies such as Nest to secure IoT devices. Rise of multi-factor authentication. Privileged access management.