Social Engineering Resources

Social Engineering, what is it, and what are some ways in which it may occur?  Please watch this short video for answers to these questions – http://hashtagawareness.com/ If you’d like more information, please see the following article: Social Engineering Attacks and How You Can Protect Yourself        

Dell Security Phishing Self Assessment

The following is a Dell Security phishing self assessment tool which will allow you to test, and hopefully refine your phishing detection skills and knowledge. Once you click the link below, you will be presented with ten sample e-mails in succession.  You will have the opportunity to  mark each as “Legitimate’ or “Phishing”.  Upon completion, […]

Printer Configuration Best Practices

Printers are a common intrusion point for access into an organizations network. It is a common misconception to think that printers are secure due to the nature of the simple tasks that they perform. However, printers are fully functional devices with exploitable services such as web servers, ftp services and hard drive device storage capabilities. […]