article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Assess the physical security measures: Evaluate access controls, surveillance systems, and environmental controls. Social engineering, for example, is a threat that makes use of human vulnerabilities for illegal access. Internal actors also play a substantial role in cybersecurity breaches.

Risk 81
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. I should also say that this when it does happen and again it's extremely, extremely rare when it does happen, It almost always involves some kind of social engineering.