Remove Authentication Remove Data preservation Remove Phishing
article thumbnail

#Secure: Locking Down Your Social Media in Style

Approachable Cyber Threats

This not only enables them to perform more effective social engineering, spear phishing, or other targeted attacks against you, but also those around you whose information they have also gleaned from your public profile. Preserving Your Reputation Your online presence is an extension of your personal and professional reputation.

Media 52
article thumbnail

#Secure: Locking Down Your Social Media in Style

Approachable Cyber Threats

This not only enables them to perform more effective social engineering, spear phishing, or other targeted attacks against you, but also those around you whose information they have also gleaned from your public profile. Preserving Your Reputation Your online presence is an extension of your personal and professional reputation.

Media 52
article thumbnail

How to Detect and Respond to Unauthorized Network Access

Responsible Cyber

Here are some common social engineering techniques: Phishing: Sending fake emails that look real to trick users into clicking on bad links or sharing sensitive info. Spear Phishing: Targeted phishing attacks aimed at specific individuals or organizations, often using personal details to seem more believable.