Wednesday, July 28, 2021

A Key Cybersecurity Vulnerability

The easiest hacking / entry point to networked computer systems is company personnel clicking bogus links in e-mails, pop-ups, or simulated trusted sites (often with a minor change in the URL, like a "1 (one)" for an "l (el)" or "i (eye)", and similar).  Can falsely claim to be an invoice, questionable purchase that can be contested by clicking a link or calling a number supplied in the e-mail, etc. Difficult to address:  Try frequent reminders / training, IT unannounced simulations ...

- jel@jelincoln.com

Added 2nd to last sentence. - JEL, 02/25/25

No comments:

Post a Comment