A Key Cybersecurity Vulnerability
The easiest hacking / entry point to networked computer systems is company personnel clicking bogus links in e-mails, pop-ups, or simulated trusted sites (often with a minor change in the URL, like a "1 (one)" for an "l (el)" or "i (eye)", and similar). Can falsely claim to be an invoice, questionable purchase that can be contested by clicking a link or calling a number supplied in the e-mail, etc. Difficult to address: Try frequent reminders / training, IT unannounced simulations ...
- jel@jelincoln.com
Added 2nd to last sentence. - JEL, 02/25/25
No comments:
Post a Comment