The Help Desk Podcast

The Help Desk Podcast


THDP8 - Social Engineering 101

February 09, 2014

…good security takes into account the least common denominator…….the human being.  Yes, even the human being who may be in charge of enforcing those very security tenets.


I don’t remember who said this but the biggest truth in this discussion is that the best security policy is only as good as its people staffing it.


Show Links:



 


References used for this Podcast/Blog:


Social Engineering:  The Basics, by:  Joan Goodchild, CSO Online, December 20, 2012,  http://www.csoonline.com/article/514063/social-engineering-the-basics?page=4


What is Social Engineering, by:  Linda Criddle, Webroot, http://www.webroot.com/us/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering


The biggest malware, security threats in 2013, by: Charlie Osborne, Zero Day, December 5, 2013,  http://www.zdnet.com/the-biggest-malware-security-threats-in-2013-7000023968/?s_cid=e036&ttag=e036


Top 5 Social Engineering Exploit Techniques, by: Jamey Heary, Network World, November 14, 2009,  http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html


Study: People open email even if its suspicious, by: Dave Johnson, Moneywatch, September 12, 2013,


http://www.cbsnews.com/8301-505143_162-57601915/study-people-open-email-even-if-its-suspicious/?tag=nl.e857&s_cid=e857&ttag=e857&ftag=TREe00e266


Cyber Security: 75% of Data Breaches are Inside Jobs, by: the Daily Staff Writer, the Information Daily.com, September 27, 2012, http://www.theinformationdaily.com/2012/09/27/75-of-data-breaches-are-inside-jobs


Social Engineering: 5 Security Holes at the Office (Includes Video), by: Joan Goodchild, CSO Security and Risk, June 8, 2009, http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-?page=1


Why cybercriminals want your personal data, by: Joe Ross, Help Net Security, November 12, 2013, http://www.net-security.org/article.php?id=1915


Computer Based Social Engineering Tools:  Social Engineer Toolkit (SET), Social Engineer.org, http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29


loaded