“BEWARE OF THE WOLF IN SHEEP’S CLOTHING”…Further Exploration Into Social Engineering…by dStringer

Oh my goodness...!

Not too long ago, I wrote a "Social Engineering" blog that I thought was pretty detailed.  It discussed different types of "Social Engineering" in depth; warning signs and what steps to take if you feel you've been victimized.

It truly is the Wild West out there.

GONE “PHISHING…”

As in anything in life, there is good...but, unfortunately, there is also bad.  So it is in the "tech" world.  There have been so many "lightening fast" advancements in this industry..that definitely is the good part, but the "law" has had trouble keeping up with these advancements.

SECURE IT WELL…PROTECT YOUR CELL by dStringer

Unless you're a hermit, you are out and about every day, sometimes several time a day.  And each time you venture outdoors, whether it's to a meeting, the grocery store, a concert, sporting event, or on vacation, it's an occasion for something to happen to your mobile phone or the information in it.

HUMANS ARE THE WEAKEST LINK…by dstringer

Internet usage is growing dramatically, but the vast majority of internet users don’t have any security backgrounds. Neither do a large majority of companies care about information security and the severity of any attack that could harm the valuable assets of these companies.

THIS IS NO JOKE…by dorothy stringer

Identity theft, social engineering, phishing,...these are all terms that are part of our life, whether you are aware or not.  We are so tied to our computer and the internet.  And even if you are not technically savvy, the world around you is, and because of that, your security is tied in with the world.