Remove Company Remove Examples Remove Network Remove Social
article thumbnail

CIOs Have To Treat Social Media With Care

The Accidental Successful CIO

Hackers can learn a lot from a CIO’s social media Image Credit: Blogtrepreneur Every person with the CIO job knows what social media is. In fact, we all probably have Facebook, LinkedIn, and other social media accounts. However, it turns out that there is a downside to social media that we may not be aware of.

Media 130
article thumbnail

Social Networking @ Work: Are You Ready?

The Accidental Successful CIO

Do CIOs need to introduce social networking into the workplace? So there’s no question that this whole social networking thing has become very, very popular. What Social Networking Would Do For Your Workplace. Who Would Use Social Networking In The Workplace. Image Credit: Christopher.

Social 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs And The Problem Of Social Engineering

The Accidental Successful CIO

Social engineering is how the bad guys get employees to say too much Image Credit: Alexandre Formagio. You are now a hacker that is trying to break into your company’s network because you understand the importance of information technology, want to get money from your company, or do something else that you really should not be doing.

article thumbnail

Why social networks need better blocking tools

The Verge

million to launch Block Party , an anti-harassment startup that helps people filter abuse out of their social media experiences. Behind all these stories, I think, is a kind of despair over what public social networks have done to public debate. Last month, Tracy Chou announced that she had raised a little under $1.5

Social 95
article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.

article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

The rise of personal gadgets, the shift towards remote work, the BYOD trend , and advances in AI have all contributed to home networks becoming an extension of companies' cyber defense perimeters. However, many end-users do not recognize their home networks as extensions of their company's security boundaries.

Network 86
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.