IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 
Definition continues below.
Social Engineering Reports
 
Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: This informational report from Forrester addresses where security awareness is falling short and how you can revamp your security awareness programs to empower employees to protect themselves and your organization from phishing attacks. Learn how to help users protect themselves and your enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Keeping Networks safe from Social Networking
sponsored by BlueCoat
EGUIDE: Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

BlueCoat

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

Global Threat Trends - December 2009
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.
Posted: 16 Sep 2009 | Published: 02 Sep 2009

ESET

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis
sponsored by Intel Security
ANALYST REPORT: This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study.
Posted: 23 Nov 2009 | Published: 29 Aug 2009

Intel Security
 
 
SOCIAL ENGINEERING DEFINITION (continued): …  to obtain personal information. In one scenario, for example, the pretexter might call an individual claiming affiliation with a bank, survey firm or credit agency. In another scenario, a pretexter might claim to be a customer, client or employee of a company to gain access to phone or electronic records. After establishing trust with the targeted individual, the pretexter might ask a series of questions designed to gather key individual identifiers (like social security numbers, mother's maiden name, place or date of birth, or account numbers) under the guise of needing to confirm the individual's … 
Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement