article thumbnail

GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps

The Last Watchdog

billion people—use social media. And while that’s incredible for staying connected with friends, organizing rallies, and sharing important messages, it’s also the reason we are facing a cyber security crisis. But why is social media such a catalyst for nefarious behavior? Social Engineering.

Media 221
article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

Yet, boardroom focus on cyber risk appears to be diminishing. The perceived threat of cyber risk to global business leaders peaked in 2021 (34%) and over the past two years, the risk perception has dropped (27%). But worryingly they appear less concerned by cyber risk than a couple of years ago.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

Best-in-class training, with testing and regular retraining and testing, will go a long way to mitigate the risks of social engineering security breaches.” Media contract: For press inquiries, please contact marketing@appdirect.com. Cybersecurity solutions are forecast to be a top purchase in the immediate future.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

That could be through common hacking techniques like phishing, bait and switch, cookie theft, deep fake , password cracking , social engineering , and so on. Often, I see a tendency to deal with risk management as a compliance issue that can be solved by creating lots of rules and ensuring employees follow them. But know this.

article thumbnail

GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks

The Last Watchdog

For instance, phishing, one of the most common, is a social engineering attack used to steal user data. Even events like the World Cup are being used by cyber criminals to target unsuspecting victims through things like fake streaming sites designed to steal private information.

Risk 203
article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

These attacks sparked public realization that cyber threats can disrupt daily life, leading to anger against corporations, not just cybercriminals, if they failed to implement basic cybersecurity measures. My book emphasizes the heightened responsibility of C-suite leaders, considering the increased public, media, and regulator scrutiny.

article thumbnail

The Implications of the Uber Breach

Security Boulevard

How to protect your organization from a social engineering attack. This tactic is called social engineering and is one of the key methods used in attacks that result in data breaches. One important and often overlooked element is social engineering education. dollars to remediate per incident.