Artwork

Content provided by Nisos, Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nisos, Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Personal Information Exposure Can Lead to Disaster

21:32
 
Share
 

Manage episode 323720300 series 3331602
Content provided by Nisos, Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nisos, Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In episode 54 of The Cyber5, we are joined by Aaron Barr, Piiq Media’s Chief Technology Officer.

We discuss how data breaches are combined with other open source information to paint a more holistic target profile for bad actors. We also discussed the true information anchors and weaponization that can lead to an online attack against someone. Finally, we discussed what executives and individuals can do to protect themselves and how protective intelligence is playing a greater role in physical security.

Four Topics Covered in this Episode:

  1. Common Information Anchors Used to Attack Someone Online
  1. Connection to an organization indicating that someone is likely a high net-worth individual.
  2. Communication platform for content delivery including, email address, social media platform, phone number, etc.
  3. Context for authenticity. The social engineering approach must have the right information about an individual for increased success.
  1. Best Practices for Staying Safe on the Internet
  1. Keep social media postings about personal information, locations, jobs, education as simple as possible. Be careful not to post pictures with background details that give your location or family profile to potential attackers.
  2. Ensure profile pictures are minimal as those are public regardless if everything else is private.
  3. Password managers should be used for personal accounts.
  4. People should have at least three personal email addresses. Email addresses should be siloed: a) social media accounts b) bank accounts or personal information c) thrown away for rewards, e-commerce, and gifts.
  1. Education and Awareness Training Still Important

Education to executives and the workforce about simple technology such as the ability to flag suspicious emails that get escalated to the security team still goes a long way in securing the workforce.

  continue reading

91 episodes

Artwork
iconShare
 
Manage episode 323720300 series 3331602
Content provided by Nisos, Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nisos, Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In episode 54 of The Cyber5, we are joined by Aaron Barr, Piiq Media’s Chief Technology Officer.

We discuss how data breaches are combined with other open source information to paint a more holistic target profile for bad actors. We also discussed the true information anchors and weaponization that can lead to an online attack against someone. Finally, we discussed what executives and individuals can do to protect themselves and how protective intelligence is playing a greater role in physical security.

Four Topics Covered in this Episode:

  1. Common Information Anchors Used to Attack Someone Online
  1. Connection to an organization indicating that someone is likely a high net-worth individual.
  2. Communication platform for content delivery including, email address, social media platform, phone number, etc.
  3. Context for authenticity. The social engineering approach must have the right information about an individual for increased success.
  1. Best Practices for Staying Safe on the Internet
  1. Keep social media postings about personal information, locations, jobs, education as simple as possible. Be careful not to post pictures with background details that give your location or family profile to potential attackers.
  2. Ensure profile pictures are minimal as those are public regardless if everything else is private.
  3. Password managers should be used for personal accounts.
  4. People should have at least three personal email addresses. Email addresses should be siloed: a) social media accounts b) bank accounts or personal information c) thrown away for rewards, e-commerce, and gifts.
  1. Education and Awareness Training Still Important

Education to executives and the workforce about simple technology such as the ability to flag suspicious emails that get escalated to the security team still goes a long way in securing the workforce.

  continue reading

91 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide