article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. Back in 2013, the Associated Press Twitter account was taken over by the Syrian Electronic Army (SEA), which posted the following tweet. Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9

Phishing 110
article thumbnail

SharePoint 2013: Is utility more important than usability?

ChiefTech

When evaluating SharePoint 2013 specifically as a collaboration platform, this question is often top of mind. The Metro user interface in SharePoint 2013 is a refreshing update to this mature platform, but usability goes deeper than just the front-end theme. Is utility more important than usability?

IT 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Some useful resources for learning about SharePoint 2013

ChiefTech

The other day I talked specifically about the social features in the SharePoint 2013 preview. Lots of people have been blogging about SharePoint 2013, with many people sharing screenshots. Alternatively, there is good overview post about SharePoint 2013 on the Microsoft SharePoint Team Blog.

Cloud 49
article thumbnail

ISO 27001:2022 Has Been Released – What Does It Mean for Your Organisation?

IT Governance

The introduction of ISO 27001:2022 won’t have an immediate effect on organisations that are currently certified to ISO 27001:2013 or are in the process of achieving certification. For the time being, organisations should continue to follow the 2013 version of the Standard. You can begin by reading the Standard for yourself.

IT 119
article thumbnail

IRMS 2013 – Brighton – Thanks

Preservica

Thanks to all those who made IRMS 2013 such a great event, to those who dropped by the stand and everyone who participated in our survey. The range of record retention policies can be very varied according to the record type/retention schedule: 7, 14 & 25+ years to for example 100 years for Child Protection Records.

article thumbnail

Here’s Some Bitcoin: Oh, and You’ve Been Served!

Krebs on Security

“If you get a default judgment against a bitcoin address, for example, and then down the road that bitcoin gets sent to an exchange that complies with or abides by U.S. For example, in 2013 the U.S. Bax said Mora’ method could allow more victims to stake legitimate legal claims to their stolen funds. federal court.”

article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 For example, hiring managers will want a network security engineer with knowledge of networks or an identity management analyst with experience in identity systems.