If you've been involved with social media then you've heard about the hacks on Facebook, MySpace, and Twitter. User accounts have been broken into and used to spread spam or links to sites carrying viruses or other malware.
Time and again, the reports try to drill into your brain that you need to make your password secure. But I've yet to hear anyone report on just what a secure password is!
In order to help correct that, I'm going to provide you a shortened version of what I provide my clients and students about creating secure passwords.
online quick earn money
Showing posts with label Social. Show all posts
Showing posts with label Social. Show all posts
How Social Media Can Compromise Your Company's Security Posture
The unbridled use of social media in the workplace represents a growing area of risk to an organization's information security posture. Social media networks present two distinct attack vectors: information leakage and false trust.
Hackers, red teams and experienced penetration testers have used OSINT (open source intelligence style information gathering) for years. But now that social media use has reached critical mass, it is relatively simple to garner information about your company's employees, your organization and even your IT infrastructure. Using social profiles, information parsed from tweets, business directories, job postings, etc., cybercriminals can put together a complete dossier on employees of a target company without any 'real' hacking.
Subscribe to:
Posts (Atom)