Six common approaches to executive social engineering

Posted on 31 August 2017

  Executives make for tantalizing hacking targets, since a successful infiltration of their accounts can lead to a huge payoff—whether financial, or in terms of information gathering, or both. Executives often have access to many data systems, and many demand exceptions to company security regulations from their IT departments when they perceive them as too burdensome. It is easy to see, therefore, why attackers are increasingly focusing on social engineering techniques that ...

Read More

How personal privacy affects corporate information security

Posted on 28 August 2017

  Spear-phishing and related social engineering techniques create a new challenge for IT professionals, since attacks that target employees’ non-work accounts and devices can bleed over into corporate IT systems. Even for companies that maintain strict device-use policies, it’s often just a short step from an employee’s compromised personal account to the company’s servers. This is especially true if that employee is an executive or someone else with high-level access to IT ...

Read More

How social engineers find your personal information

Posted on 25 August 2017

  Social engineering is one of the fastest growing types of cybercrime, since it leverages human error to get past even the most robust security systems. It’s also highly adaptable: from Edward Snowden’s NSA leaks to executive wire fraud, from corporate espionage to ransomware attacks, social engineering has been a part of many of the biggest data breaches in recent years. So what is the key ingredient to a successful social engineering attack? Personal information. In order ...

Read More

Reputation Management Do’s and Don’ts for Businesses on Twitter

Posted on 24 August 2017

These days almost every company has a Twitter account. Social media is an ideal place to build positive reputation capital and, with all accounts public,  social media is critical to reputation management and Twitter lends itself especially well to business use . However there’s a right and wrong way to tweet. Mistakes can cost you followers, discourage new customers and create a scandal that could follow the company for months....

Read More

Tagged social media

Corporate social engineering: what makes for an appealing mark?

Posted on 21 August 2017

  Corporate social engineering is one of the most difficult IT security threats to prevent, because it targets human error instead of system weaknesses. No matter how strong your company’s cybersecurity defenses are, a skilled social engineer can bypass them if he or she can figure out how to trick someone on the inside into sharing access. For this reason, the best defense against spear-phishing and other targeted social engineering techniques is to make your users less ...

Read More

easyJet Understands the Difficulty of Online Reputation Management

Posted on 18 August 2017


Read More

Tagged reputation

Social Media & Online Reputation Management in Sports

Posted on 18 August 2017

Social media is a great way for athletes to share information with their followers and supporters, keeping them up to date with professional milestones as well as allowing them to engage one-to-one. However, with this level of intimacy comes a degree of risk. At times social media can be misused, and with such large audiences, mistakes aren’t easily rectified. It is important that athletes are aware of their responsibilities and how to respond to negative situations should ...

Read More

The missing link in corporate IT security

Posted on 16 August 2017

  Corporate IT security has never been more important, yet even the most sophisticated software defenses can’t protect against human error. It should come as no surprise, therefore, that attackers increasingly rely on spear-phishing and other social engineering approaches to break into corporate IT systems. In particular, when it comes to hacking executives and other high-value targets, it pays for cybercriminals to mount sophisticated, highly personalized attacks against ...

Read More

Reputation Management for Franchises Owners

Posted on 14 August 2017

Franchise businesses face a unique challenge when it comes to reputation management. Today, almost everyone is on the internet. This is where potential customers learn about your business and decide whether they want to buy from you or not. This is also where satisfied - or not so satisfied - customers come to tell others about their experience....

Read More

Tagged brand

Don’t Throw Away Your Online Reputation With a Throwaway Comment

Posted on 11 August 2017

Contributing to social media discussions by posting and commenting is something that considerable care should be taken over and in no demographic is this more apparent and applicable than teenagers/young adults.  The significance and impact of a throwaway comment/retweet/picture on a Twitter feed or Facebook page should not be underestimated. Social media has changed the way we communicate; private conversations can become public and public conversations can become viral....

Read More