Artwork

Innehåll tillhandahållet av Nisos, Inc.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Nisos, Inc. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Personal Information Exposure Can Lead to Disaster

21:32
 
Dela
 

Manage episode 323720300 series 3331602
Innehåll tillhandahållet av Nisos, Inc.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Nisos, Inc. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

In episode 54 of The Cyber5, we are joined by Aaron Barr, Piiq Media’s Chief Technology Officer.

We discuss how data breaches are combined with other open source information to paint a more holistic target profile for bad actors. We also discussed the true information anchors and weaponization that can lead to an online attack against someone. Finally, we discussed what executives and individuals can do to protect themselves and how protective intelligence is playing a greater role in physical security.

Four Topics Covered in this Episode:

  1. Common Information Anchors Used to Attack Someone Online
  1. Connection to an organization indicating that someone is likely a high net-worth individual.
  2. Communication platform for content delivery including, email address, social media platform, phone number, etc.
  3. Context for authenticity. The social engineering approach must have the right information about an individual for increased success.
  1. Best Practices for Staying Safe on the Internet
  1. Keep social media postings about personal information, locations, jobs, education as simple as possible. Be careful not to post pictures with background details that give your location or family profile to potential attackers.
  2. Ensure profile pictures are minimal as those are public regardless if everything else is private.
  3. Password managers should be used for personal accounts.
  4. People should have at least three personal email addresses. Email addresses should be siloed: a) social media accounts b) bank accounts or personal information c) thrown away for rewards, e-commerce, and gifts.
  1. Education and Awareness Training Still Important

Education to executives and the workforce about simple technology such as the ability to flag suspicious emails that get escalated to the security team still goes a long way in securing the workforce.

  continue reading

91 episoder

Artwork
iconDela
 
Manage episode 323720300 series 3331602
Innehåll tillhandahållet av Nisos, Inc.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Nisos, Inc. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

In episode 54 of The Cyber5, we are joined by Aaron Barr, Piiq Media’s Chief Technology Officer.

We discuss how data breaches are combined with other open source information to paint a more holistic target profile for bad actors. We also discussed the true information anchors and weaponization that can lead to an online attack against someone. Finally, we discussed what executives and individuals can do to protect themselves and how protective intelligence is playing a greater role in physical security.

Four Topics Covered in this Episode:

  1. Common Information Anchors Used to Attack Someone Online
  1. Connection to an organization indicating that someone is likely a high net-worth individual.
  2. Communication platform for content delivery including, email address, social media platform, phone number, etc.
  3. Context for authenticity. The social engineering approach must have the right information about an individual for increased success.
  1. Best Practices for Staying Safe on the Internet
  1. Keep social media postings about personal information, locations, jobs, education as simple as possible. Be careful not to post pictures with background details that give your location or family profile to potential attackers.
  2. Ensure profile pictures are minimal as those are public regardless if everything else is private.
  3. Password managers should be used for personal accounts.
  4. People should have at least three personal email addresses. Email addresses should be siloed: a) social media accounts b) bank accounts or personal information c) thrown away for rewards, e-commerce, and gifts.
  1. Education and Awareness Training Still Important

Education to executives and the workforce about simple technology such as the ability to flag suspicious emails that get escalated to the security team still goes a long way in securing the workforce.

  continue reading

91 episoder

Alla avsnitt

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide