When contemplating cybersecurity, companies often overlook the risks posed by social engineering and focus only on infrastructure and technology. But with humans still forming the weakest part of the security chain, the very real threat of social engineering should definitely not be ignored.
Read more
The new year has arrived! As we prepare to step into a metaphorical clean slate, many people are reignited by the idea of pursuing a new direction with greater goals, hopes, and dreams.
Read more
USB attacks cannot take place without human involvement because they rely on an individual (either knowingly or unknowingly) inserting a flash drive laced with malware into an unprotected device, typically located in a public place such as an office. Sometimes the drives are inserted out of curiosity, but they can also be plugged into a computer located nearby in a misguided act of helpfulness.
Read more