article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: What are some of the most common social engineering tactics that cybercriminals use?

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

I knew that security holes existed for years, but because communications were more commonly B2B, it was not a priority. There was increased concerned for protection of consumer privacy because of the use of cellphones, social media, and other Internet of Things (IoT) technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. IoT Devices. IoT devices include wearable devices, coffee makers, sensors, and cameras, all of which connect to the Internet. Conclusion.

IoT 126
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

As businesses in every sector embrace digital transformation initiatives, adopting cloud computing, Internet of Things (IoT) devices, automation, AI, and interconnected ecosystems, their attack surface widens exponentially. Similarly, in this era of distributed work, employees access company resources from various locations and devices.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

And social engineering can crack even more considering how many people include the names of their families and birthdays. Two-factor authentication is also being deployed for mobile security and by Internet of Things companies such as Nest to secure IoT devices. Rise of multi-factor authentication. MFA can be hacked.