Remove B2B Remove IoT Remove Ransomware Remove Social Engineering
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: What are some of the most common social engineering tactics that cybercriminals use?

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

I knew that security holes existed for years, but because communications were more commonly B2B, it was not a priority. There was increased concerned for protection of consumer privacy because of the use of cellphones, social media, and other Internet of Things (IoT) technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. IoT Devices. IoT devices include wearable devices, coffee makers, sensors, and cameras, all of which connect to the Internet. Conclusion.

IoT 121
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

The cybercriminal’s arsenal grows daily, from ransomware and supply chain attacks to advanced persistent threats (APTs) and zero-day exploits. Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre.