Social engineering: Is security focused on the wrong problem?

Security Awareness Training and Internal Threats-Information

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Securing the internal Windows network

    Hardening your Windows network from the outside is a good idea but don't forget to watch out for internal threats. This to-do list shows how to secure your Windows network from within. 

  • Checklist: What to do when you've been hacked

    Network hacking attacks are more common than most of us would like to admit. In this tip, SearchSecurity.com's network security Michael Gregg guru outlines six questions you should ask of your organization if you've been hacked, and provides strategi... 

  • Five common insider threats and how to mitigate them

    Users can be an enterprise's best defense or its worst enemy. They have access to valuable network resources and information that can be used for ill-gain, be it accidentally or intentionally. This tip explains five common insider threats and offers ... 

  • Hacker holiday greetings: Social engineering tactics

    While hackers may have a myriad of programs and exploits to choose from, they all pale in comparision to their numbe one weapon: social engineering. In this tip, contributor Tony Bradley provides some techniques that all should look out for. 

  • Delivering daily security tips to users

    Educating users on security is a big part of overall security. This little-known Quote of the Day protocol can help dispense advice using a login script without overwhelming the user. Networking expert Tom Lancaster provides instructions for enabling... 

  • Creating a corporate security culture

    Learn how to successfully consolidate, integrate and centralize your security practices, as well as set in motion a security governance process that defines your company's security vision and strategy. 

  • How to perform a bug sweep

    Learn why many corporations have started to perform bug sweeps or Technical Security Counter Measure (TSCM) operations, and five basic technologies used by TSCM operators. 

  • Checklist for meeting the PCI Data Security Standard

    Contributor Diana Kelley summarizes the best ways to meet the PCI Data Security Standard. 

  • Meeting the PCI Data Security Standard requirements mitigates threats

    Learn how how using five security best practices gets you closer to compliance with the PCI Data Security Standard and helps mitigate common threats to e-business. 

  • Thwarting insider threats

    Five simple measures you can take to protect your organization from insider attacks.