The Art of Deception: Stories of How We All Get Phished
Are you like most people who associate cyber, cyber security, data breaches and other similar terms with computers and technology? When you hear about a data breach in the news, do you immediately wonder which technical vulnerability was exploited? This is probably the reason why so many companies believe that a breach won’t happen to their company. They believe hackers only exploit technical vulnerabilities and somehow their tools and techniques for securing data are better than everyone else’s. Regardless of the reason, most are ignoring the one weak link in the chain that is more easily exploited than most technical vulnerabilities but much more difficult to mitigate — the end-user. The employee with access to the network is by far a much greater threat than just about any technical vulnerability. One click and your network is compromised.
Read more