In this Security School lesson, expert David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.
About the author:
David Sherry is chief information security officer at Brown University.
In this part:
Attackers go to great lengths to infiltrate organizations and go well beyond technically savvy hacks to worm through networks and systems to steal identity information and ultimately intellectual property. This webcast will break down a modern attack and...
In this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put a dent in phishers’ attempts at spear phishing.
Podcast: Five Ways to Combat Social Engineering Attacks Against Your Organization
Nearly every attack against an organization has its roots in social engineering. Attackers do significant reconnaisance against targets and mine data in order to craft campaigns to steal identity data and access. In this podcast, you’ll learn five ways to make the first step in your security realignment and how to teach employees the dangers of putting too much information on social networks, how to spot scams online and in person and what you should do should you suspect you're being socially engineered.
Quiz: Realign your data protection efforts
How much have you learned about prioritizing your data protection efforts around social engineering attacks? Test your knowledge in this short quiz.