• Exploring Social Engineering Threats: How Companies Increase Their Vulnerability

  • Jul 9 2024
  • Duración: 6 m
  • Podcast

Exploring Social Engineering Threats: How Companies Increase Their Vulnerability  Por  arte de portada

Exploring Social Engineering Threats: How Companies Increase Their Vulnerability

  • Resumen

  • In this episode of "The ITSM Practice," host Luigi Ferri delves into the effectiveness of social engineering tactics and the critical oversights that heighten organizational vulnerability. Luigi emphasizes the importance of comprehensive training and developing a robust security culture within businesses to combat these psychological manipulations effectively. He illustrates how attackers exploit trust and curiosity, often leading to significant security breaches, and underscores the necessity for more than just technological defenses.


    In this episode, we answer to:

    How do social engineering attackers exploit human psychology to infiltrate organizations?

    Why is comprehensive cybersecurity training crucial in preventing social engineering attacks?

    What are the common mistakes in incident response plans that exacerbate the impact of social engineering breaches?


    Resources Mentioned in this Episode:

    PECB, article "Social Engineering and Risk from Cyber-Attacks", link https://pecb.com/article/social-engineering-and-risk-from-cyber-attacks


    ENISA, article "What is "Social Engineering"?", link https://www.enisa.europa.eu/topics/incident-response/glossary/what-is-social-engineering


    IBM, article "What is social engineering?", link https://www.ibm.com/topics/social-engineering


    CISCO, article "What Is Social Engineering?", link https://www.cisco.com/c/en/us/products/security/what-is-social-engineering.html


    Connect with me on:

    LinkedIn: https://www.linkedin.com/in/theitsmpractice/

    Website: http://www.theitsmpractice.com

    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


    Credits:

    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


    Graphics by Yulia Kolodyazhnaya

    Más Menos
activate_primeday_promo_in_buybox_DT

Lo que los oyentes dicen sobre Exploring Social Engineering Threats: How Companies Increase Their Vulnerability

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.