Posts Tagged ‘scott wright’

Ongoing Awareness Communications and Regular Training Are Necessary For Effective Information Security & Privacy Programs

Wednesday, April 1st, 2009

Scott Wright over at Streetwise Security Zone graciously invited me to do a podcast interview with him to discuss information security, privacy and compliance training and awareness issues. In the last half of February I had the pleasure of taking him up on his invitation!
You can hear the full podcast here.
Here are the notes Scott compiled about our discussion topics:

(more…)

Vishing Very Vicious

Sunday, November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

(more…)

Vishing Very Vicious

Sunday, November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

(more…)

Vishing Very Vicious

Sunday, November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

(more…)

Privacy and Security Lost And Found

Monday, April 14th, 2008

Today I’ve been participating in a very interesting discussion on the Security Catalyst Community about a very interesting project that Scott Wright is doing with Honey Sticks at his site.
Part of the discussion led to the possibility that one of the Honey Sticks that Scott had planted in a hotel, and had been “activated,” may have been turned in to the hotel’s lost and found.

(more…)