Articles by David Blazier
Customer service skills can be a handicap in the fight against fraud.
September 26, 2012
High-tech countermeasures do little to prevent a CU’s employees from succumbing to social engineering.Read More
Impersonation is a favorite weapon in the social engineer’s arsenal.
May 9, 2012
Impersonators using this technique can persuade or manipulate employees into divulging sensitive corporate information.Read More
Social engineers wait for naïve, untrained staff to fall into their traps.
September 12, 2011
Without proper security awareness training, most front-line employees will be unaware of their surroundings and oblivious to social engineering.Read More
More than half of internal data theft crimes are carried out by low- and mid-level staff.
August 16, 2011
CUs are more likely to experience data breaches originating from an internal threat rather than an external source.Read More
These crooks truly adopt the attitude of 'work smarter, not harder.'
October 11, 2010
We can all thank the film industry for permanently skewing our perception of computer hackers.Read More
Smart criminals go after the 'lowest hanging fruit.'
September 16, 2010
Social engineering tactics exploit the fundamentals of human nature.Read More