Contact Us

Continuity Insights Management Conference

We’re only as strong as the weakest link in the chain. And when it comes to cybersecurity, people are the weakest link, which is why savvy hackers will seize any opportunity to exploit social networks.

In a recent post from the SoS Daily News, cybersecurity experts Stickley on Security are well aware of the fun and fascination association with social media, but they also take the time to discuss risks lying in wait on the dark side.

Cybercriminals and hackers are using social engineering to exploit social networks – attempting to get someone to install software that will give them access to a computer or phone and gaining trust to exploit personal connections and manipulate people through the social network.

Read the full post on the SoS Daily News to avoid becoming a victim of fraud or identity theft at the hands of cybercriminals and hackers.

Continuity Insights

Similar Articles

Robert C. Chandler, Ph.D.

When Doing the Right Thing is the Right Thing to Do

Models of Good Contingency Management Leadership Plenary Session P1: Robert C. Chandler, Ph.D. – Professor of Communication, Lipscomb University Leadership is the most influential and critical element of successfully managing a contingency …

Why Cybersecurity Is Central for Businesses Looking to Build Long-Term Resilience

This year, many companies realized business resilience was more than just a buzzword on a PowerPoint slide. They found themselves struggling to survive a crisis no one saw coming, but …

Cybersecurity Toolkit Enables Small Businesses to Stay Protected

The Global Cyber Alliance (GCA) and Mastercard have released a new Cybersecurity Toolkit specifically designed for small and medium businesses. This free online resource is available worldwide and offers actionable guidance …

Leave a Comment

Share to...