To a social engineer intent on extracting data, the modern office reads like an open book. Over-the-shoulder reconnaissance reveals what is available, where it is, and who has access to it – all the ingredients an adversary needs to succeed at a data breach. Organizations that focus exclusively on network security may keep out external attackers, but that’s not enough to prevent insider-driven breaches. Without also protecting data-in-use on computer screens it’s like locking the doors while leaving the windows wide open.
See this new webinar by CEO Bill Anderson as he talks about social engineering trends, threats to government information systems, and what you can do about it.