If you’re not sure where to start in protecting that information, we can help.Įxperienced criminals, con-artists and social engineers use pretexting to create scenarios where a person is comfortable releasing information that they normally would not (). Billing information, invoices, W-2s, contracts, marketing materials, research and development, trade secrets, client and investor information, pre-press release information, and anything that gives your organization a competitive edge should be protected. The first step to understanding the value of your data can be accomplished by executing a data mapping exercise.Īre you only focused on protecting your social security numbers, credit card data, ePHI, and financial information? If so, it’s time to think about the other treasure troves of data within your organization. It’s time to look at your data through the eyes of adversaries and cybercriminals. Trade secrets, internal processes, client information, marketing plans, and even your employees’ W-2 statements can be valuable acquisitions for criminals and competitors alike. Their mission is not to steal your passwords, but rather your business! This “private equity” firm is a group of well-trained social engineers and cyber criminals that have been contracted to infiltrate your asset management company. Meanwhile, your financial institution is merely alerting you of suspicious account activities. What if these scenarios were not what they seemed to be? In fact, the seemingly harmless scenario is malicious. Is this malicious or harmless? Seems harmless right? Perhaps even a great opportunity. They have also requested that the previous year’s financial statements are relayed. The private equity firm has stated they would like to decide to either invest or not. You are asked to bring sales forecasts and projections for the fiscal quarter. A conference call is setup with your executive staff and board members to discuss the details. They would like to potentially invest in your business. This article was commending your business for its rapid expansion and market disruption. Is this malicious or harmless? Seems pretty malicious right?Ī large private equity firm sends you an email stating that they recently viewed an article in a local business journal. The representative asks you for your full name, date of birth, and home address. If you were presented with the following scenarios, your reaction and responses may be dramatically different:Ī financial institution calls your business and tells you they believe that suspicious activities are occurring on your business bank account. Sometimes, the information that’s given away has more value to the recipient than it does to you. Criminals only want your passwords, social security numbers, credit card numbers, banking information, and personal health information, right?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |