Remove CSO Remove Media Remove Social Engineering
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

These groups are also shifting toward more human-centric exploits , like social engineering and insider assistance. Failure to do so could render them redundant, prompting many to consider transitioning into roles as virtual CISOs (vCISOs) or CSO consultants to balance escalating responsibilities and accountability.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor. Fun fact: 80% of these breaches occur at the endpoint , often via phishing or social engineering. Let’s talk VPNs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity First: #BeCyberSmart at Work and Home

Security Through Education

Watch what you post on social media; cybercriminals often use them to gather Personal Identifying Information (PII) and corporate information. Social-Engineer, LLC saw an almost 350% increase in recognition of phishing emails when using a similar training platform in 2020. Don’t make passwords easy to guess.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Without APIs there would be no cloud computing, no social media, no Internet of Things. If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. APIs are the glue that keeps digital transformation intact and steamrolling forward.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. When surveillance leads to spying.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

His expertise is in social engineering, technology, security algorithms and business. Army officer, Sachs served as deputy director of SRI International’s Computer Science laboratory, vice president of national security policy at Verizon Communications, and SVP and CSO of the North American Electric Reliability Corporation.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.