The Help Desk Podcast
![Cover art of The Help Desk Podcast The Help Desk Podcast](https://assets.blubrry.com/coverart/300/24271.jpg)
THDP8 - Social Engineering 101
…good security takes into account the least common denominator…….the human being. Yes, even the human being who may be in charge of enforcing those very security tenets.
I don’t remember who said this but the biggest truth in this discussion is that the best security policy is only as good as its people staffing it.
Show Links:
- MalwareBytes Pro
- McAfee
- Norton’s
- Kaspersky Labs
- AVG fREE
- Avast be free
- Avira Free Antivirus
- Bitdefender
- eSet family of security products
- Trend Micro Titanium Maximum Security
- Webroot
- Sophos
- Symantec End-Point Protection
- Windows Defender
- Algorithms
References used for this Podcast/Blog:
Social Engineering:Â The Basics, by:Â Joan Goodchild, CSO Online, December 20, 2012, Â http://www.csoonline.com/article/514063/social-engineering-the-basics?page=4
What is Social Engineering, by:Â Linda Criddle, Webroot, http://www.webroot.com/us/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
The biggest malware, security threats in 2013, by: Charlie Osborne, Zero Day, December 5, 2013, Â http://www.zdnet.com/the-biggest-malware-security-threats-in-2013-7000023968/?s_cid=e036&ttag=e036
Top 5 Social Engineering Exploit Techniques, by: Jamey Heary, Network World, November 14, 2009, Â http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html
Study: People open email even if its suspicious, by: Dave Johnson, Moneywatch, September 12, 2013,
Cyber Security: 75% of Data Breaches are Inside Jobs, by: the Daily Staff Writer, the Information Daily.com, September 27, 2012, http://www.theinformationdaily.com/2012/09/27/75-of-data-breaches-are-inside-jobs
Social Engineering: 5 Security Holes at the Office (Includes Video), by: Joan Goodchild, CSO Security and Risk, June 8, 2009, http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-?page=1
Why cybercriminals want your personal data, by: Joe Ross, Help Net Security, November 12, 2013, http://www.net-security.org/article.php?id=1915
Computer Based Social Engineering Tools:Â Social Engineer Toolkit (SET), Social Engineer.org, http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29