Employees can be weak links in data breaches

Lighted Keyboard 2 by Eric Norris

From the Morning Call news item:

Attackers shifted away from automated exploits and instead engaged people to do the dirty work — infecting systems, stealing credentials and transferring funds,” said the study by Proofpoint, a technology security company in California.

“These attacks differed in scale and volume,” Proofpoint said. “But they all shared one common thread: using social engineering to persuade people to do the work of malware — and deliver big dividends for the attackers.”

It’s not difficult to find real-world proof of what Proofpoint is warning about.

Last week, Main Line Health in suburban Philadelphia said an employee was duped into sending the personal information of the health system’s employees to someone who had emailed requesting the data…

Read the full article at the link:
http://www.mcall.com/news/local/watchdog/mc-email-phishing-scams-identity-theft-watchdog-20160309-column.html

About Author: GHCAN Admin

Comments are closed.