online quick earn money
Showing posts with label Compromise. Show all posts
Showing posts with label Compromise. Show all posts
How Social Media Can Compromise Your Company's Security Posture
The unbridled use of social media in the workplace represents a growing area of risk to an organization's information security posture. Social media networks present two distinct attack vectors: information leakage and false trust.
Hackers, red teams and experienced penetration testers have used OSINT (open source intelligence style information gathering) for years. But now that social media use has reached critical mass, it is relatively simple to garner information about your company's employees, your organization and even your IT infrastructure. Using social profiles, information parsed from tweets, business directories, job postings, etc., cybercriminals can put together a complete dossier on employees of a target company without any 'real' hacking.
Subscribe to:
Posts (Atom)