• Tony Liu

Your Essential Cybersecurity Toolkit

Cybersecurity may seem like a complicated and scary topic - that's because it can be. But if you're prepared and understand how to protect your business with some safety measures, it can be an amazing asset.


I can help. Download the Essential Cybersecurity Toolkit and learn how you can protect your business today. Better yet, give me a call.


3 types of Social Engineering Scams to Know


Employee awareness of social engineering is essential for ensuring corporate cybersecurity. If end users know the main characteristics of these attacks it is much more likely they can avoid falling for them. As many of use are visual learners, make sure to provide them with actual examples of these scams.



Phishing: The leading tactic leveraged by todays ransomware hackers, typically delivered in the form of an email, chat, web ad or website designed to impersonate a real system and organization.


Baiting: Similar to phishing, baiting involves offering something enticing to an end user in exchange for private data. The “bait” comes in many forms, both digital, such as a music or movie download, and physical, such as a branded flash drive labeled “Executive Salary Summary Q3 2016” that is left out on a desk for an end user to find. Once the bait is taken, malicious software is delivered directly into the victim’s computer.


Tailgating: is when an unauthorized person physically follows an employee into a restricted corporate area or system. The most common example of this is when a hacker calls out to an employee to hold a door open for them as they’ve forgotten their RFID card.


#cybersecuritylibrary #cisacyberessentials #guideforcybersecurityeventrecovery #cybersecuritystandards #officeofcybersecurity #cybersecurityofficial #cybersecurityinitiatives #cybersecurity #pconsite


2 views0 comments

Recent Posts

See All