Various physical and security threads in companies:
Physical security threats:
1- Leaving keycards (entry system) unattended
2- Tailgating into area
Cybersecurity Threats:
1- Phishing (fishing for passwords)
Scammer uses emails and links inside the websites or chat messages to obtain information with harmful intent.
Some characteristics of phishing messages:
2- Vishing
Scammer uses voice calls or voice mails to obtain information.
3- Smishing
Scammer uses text messages to obtain information.
4- Clone Phishing
Scammer hijacks an email account from an organization to have access to the sent emails. Then selects the target and clones one of submitted emails and provides a follow up email to implement its hack. For example, via attached file or links including the malware for stealing the information.
5- Spear Phishing
Scammer targets specific individuals or organizations.
6- Deep Fake Audio Scam:
A.I. (Artificial Intelligence) voices can be used to scam people. Scammer feeds recorded voice or video of the targeted person into an AI program to learn the voice. Then after typing the sentences, AI program starts reading the text with imitating the voice.
7- Pig Butchering Scam:
Scammer tricks victims into sending money to a fraudulent investment website or application.
Common employee mistakes:
Cybersecurity attack goals:
Leave a Reply