Information security threats

Information security threats
Information security means that the confidentiality,
integrity and availability of information assets is
maintained.
 Confidentiality: This means that information is only
used by people who are authorized to access it.
 Integrity: It ensures that information remains intact
and unaltered. Any changes to the information through
malicious action, natural disaster, or even a simple
innocent mistake are tracked.
 Availability: This means that the information is
accessible when authorized users need it.
Most common types of information security threats are:
 Theft of confidential information by hacking
 System sabotage by hackers
 Phishing and other social engineering attacks
 Virus, spyware and malware
 Social Media-the fraud threat
One of the major threat to information security is the theft of
confidential data by hacking. This includes theft of employee
information or theft of trade secrets and other intellectual
property (IP).
Theft of Employee Information
 Employee information includes credit card information, corporate credit card information,
social security number , address, etc. It also includes theft of healthcare records as they
contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
 Technology from various verticals including IT, aerospace, and telecommunications are
constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender
as it continues to advance in technology relying on theft of international trade secrets and IP.
 Piracy/copyright infringement.
 Corporate business strategies including marketing strategies, product introduction
strategies.
What is system sabotage?
Planting malware on networks of target organization and generating
an enormous amount of transaction activity resulting in malfunction or
crash of the system.
Who would perpetrate it?
 System sabotage is usually committed by disgruntled ex-employees
and by remote cyber-attackers for no particular reason.
 The most sensational case of system sabotage: One of the recent
examples is the sabotage of Sony PlayStation.
 To obtain confidential data about individuals-customers, clients,
employees or vendors that can be used to commit various types
of identity fraud such as:
◦ Opening bank accounts in victim’s name
◦ Applying for loans in victim’s name
◦ Applying for credit cards in victim’s name
◦ Obtaining medical services in victims name (e-death)
 Other kind of more sophisticated social engineering attacks
include spear-phishing.
 Spear-phishing targets specific individuals such as AP manger,
controller, senior accountant to gain access to corporate bank
accounts and transfer funds abroad.
Other threats include:
 Smishing: Phishing via SMS (texting)
 Vishing: Phishing via voice (phone)
 Mobile hacking: Intercepting messages between cell
phone/smart phones and stealing data
Virus and Spyware
 Virus: A computer virus is a malicious software or code that
can replicate itself and spread to other computers and can
damage a computer by deleting files, reformatting the hard
disk etc.
 Spyware: It is software that secretly tracks information such
websites visited, browser and system information, and
computer IP address and transmits the data gathered to the
another system.
Impersonation is one of the social engineering tools used
by fraudsters to commit identity theft. Following are best
practices to protect organizations from social engineering
attacks:
 Broaden company’s online reputation. Blogging is the best.
 As part of online reputation management, optimize your company’s
listings in search engines like Google (search engine optimization).
 If a company identifies themselves using your organization’s photo
or bio in social media, be very persistent in contacting their site
administrators. They too have reputations to manage and they will
often delete stolen profiles as this constitutes to fraud.
 Enlist services such as Mark Monitor or other brand protection and
trademark management firms.
Want to learn more about information security, its
requirements and best practices to comply with them?
ComplianceOnline webinars and seminars are a great
training resource. Check out the following links:
 Information Security and Cybercrime
Prevention Essentials
 How to Manage Ongoing Information Security
Requirements?
 How to Evaluate Effectiveness of Your
Information Security Program?
 Auditing Your Information Security Program.
 Third Party Information Security Assessment.
1 von 9

Recomendados

Threats to information security von
Threats to information securityThreats to information security
Threats to information securityarun alfie
606 views20 Folien
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA von
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
577 views19 Folien
Cybersecurity Attack Vectors: How to Protect Your Organization von
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
3.7K views20 Folien
Introduction to information security von
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
3.3K views19 Folien
Information security von
Information securityInformation security
Information securityavinashbalakrishnan2
2K views59 Folien
INFORMATION SECURITY SYSTEM von
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
1K views27 Folien

Más contenido relacionado

Was ist angesagt?

Introduction to information security von
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
3.3K views45 Folien
Cyber security von
Cyber securityCyber security
Cyber securityBhavin Shah
1.4K views26 Folien
Information security in todays world von
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
895 views46 Folien
Information Security Awareness Training von
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
24.1K views38 Folien
The Insider Threat von
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
4.3K views30 Folien

Was ist angesagt?(20)

Introduction to information security von Kumawat Dharmpal
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal3.3K views
Information Security Awareness Training von Randy Bowman
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman24.1K views
The Insider Threat von PECB
The Insider ThreatThe Insider Threat
The Insider Threat
PECB 4.3K views
Cyber security and demonstration of security tools von Vicky Fernandes
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes2.6K views
Cyber Security von Ramiro Cid
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid6.6K views
Cyber Security Incident Response von PECB
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB 11K views
Basic concepts in computer security von Arzath Areeff
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff27.1K views
Information System Security(lecture 1) von Ali Habeeb
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb8.6K views
Physical Security Presentation von Wajahat Rajab
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab41.2K views
Cyber Threat Management von Rishi Kant
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
Rishi Kant438 views

Destacado

Diesel theft detection-fuel pilferage prevention-generator-case study-5 von
Diesel theft detection-fuel pilferage prevention-generator-case study-5Diesel theft detection-fuel pilferage prevention-generator-case study-5
Diesel theft detection-fuel pilferage prevention-generator-case study-5Ideonics
657 views10 Folien
Fleet Fuel Management: Analysis and Reporting von
Fleet Fuel Management: Analysis and ReportingFleet Fuel Management: Analysis and Reporting
Fleet Fuel Management: Analysis and ReportingSokolis Group
1.9K views10 Folien
Information Security for Enterprise von
Information Security for EnterpriseInformation Security for Enterprise
Information Security for EnterpriseArjun V
886 views10 Folien
What Cybercriminals Want: Company Data – by United Security Providers von
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
378 views16 Folien
Managing the Cyberthreat Landscape von
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat LandscapeAT&T
213 views13 Folien
How to commit corporate espionage (10 Card Deck) von
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)Amanda Abelove
608 views12 Folien

Destacado(16)

Diesel theft detection-fuel pilferage prevention-generator-case study-5 von Ideonics
Diesel theft detection-fuel pilferage prevention-generator-case study-5Diesel theft detection-fuel pilferage prevention-generator-case study-5
Diesel theft detection-fuel pilferage prevention-generator-case study-5
Ideonics657 views
Fleet Fuel Management: Analysis and Reporting von Sokolis Group
Fleet Fuel Management: Analysis and ReportingFleet Fuel Management: Analysis and Reporting
Fleet Fuel Management: Analysis and Reporting
Sokolis Group1.9K views
Information Security for Enterprise von Arjun V
Information Security for EnterpriseInformation Security for Enterprise
Information Security for Enterprise
Arjun V886 views
Managing the Cyberthreat Landscape von AT&T
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
AT&T213 views
How to commit corporate espionage (10 Card Deck) von Amanda Abelove
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)
Amanda Abelove608 views
The Effect Of Lack Of Security On Industry von lilian91
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
lilian9112.2K views
The value proposition of advanced telematics von Tristan Wiggill
The value proposition of advanced telematicsThe value proposition of advanced telematics
The value proposition of advanced telematics
Tristan Wiggill1.6K views
Employee volunteering opportunities at aid for change von AID FOR CHANGE
Employee volunteering opportunities at aid for changeEmployee volunteering opportunities at aid for change
Employee volunteering opportunities at aid for change
AID FOR CHANGE1.5K views
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate... von ComplianceOnline
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...
ComplianceOnline183 views

Similar a Information security threats

Ethical and security issues on MIS inte 322 assignment.docx von
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
39 views4 Folien
Cyber Security.docx von
Cyber Security.docxCyber Security.docx
Cyber Security.docxTanushreeChakraborty27
122 views5 Folien
Cyber Ethics Notes.pdf von
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
972 views44 Folien
Shailendra Pandey.ppt von
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.pptShailendraPandey92
9 views14 Folien
Task 3 von
Task 3Task 3
Task 3BIBEKCHAUDHARYBScHon
72 views4 Folien
Shailendra Pandey.ppt von
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.pptShailendraPandey96
5 views12 Folien

Similar a Information security threats(20)

Ethical and security issues on MIS inte 322 assignment.docx von GogoOmolloFrancis
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
Cyber Ethics Notes.pdf von AnupmaMunshi
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
AnupmaMunshi972 views
Internet fraud and Common modes of security threats .pptx von MoizAhmed398372
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
MoizAhmed39837216 views
Ethical hacking Chapter 1 - Overview.pptx von Nargis Parveen
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen3K views
Information security von IshaRana14
Information securityInformation security
Information security
IshaRana14117 views
Edu 03 assingment von Aswani34
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34102 views
Cyber security threats and its solutions von maryrowling
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling273 views
Implications of Misuse and Cyber Security.pdf von srtwgwfwwgw
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw121 views
INFORMATION SECURITY: THREATS AND SOLUTIONS. von Ni
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni 5.6K views
Whitepaper-When-Admins-go-bad von banerjeea
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea131 views
Cyber Security Threats | Cyberroot Risk Advisory von CR Group
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
CR Group18 views

Más de complianceonline123

Fda adverse event reporting requirements for otc drugs von
Fda adverse event reporting requirements  for otc drugsFda adverse event reporting requirements  for otc drugs
Fda adverse event reporting requirements for otc drugscomplianceonline123
1K views10 Folien
Social media risks rules policies procedures von
Social media risks rules policies  proceduresSocial media risks rules policies  procedures
Social media risks rules policies procedurescomplianceonline123
474 views11 Folien
Fmla ada overlap von
Fmla  ada  overlapFmla  ada  overlap
Fmla ada overlapcomplianceonline123
929 views14 Folien
Hipaa enforcement examples von
Hipaa enforcement examplesHipaa enforcement examples
Hipaa enforcement examplescomplianceonline123
362 views9 Folien
Excel spreadsheets how to ensure 21 cfr part 11 compliance von
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliancecomplianceonline123
6.3K views8 Folien
Retail loss von
Retail lossRetail loss
Retail losscomplianceonline123
1.3K views18 Folien

Más de complianceonline123(20)

Fda adverse event reporting requirements for otc drugs von complianceonline123
Fda adverse event reporting requirements  for otc drugsFda adverse event reporting requirements  for otc drugs
Fda adverse event reporting requirements for otc drugs
Excel spreadsheets how to ensure 21 cfr part 11 compliance von complianceonline123
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliance
complianceonline1236.3K views
Out in the open protecting your privacy in the digital age von complianceonline123
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential von complianceonline123
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s PotentialReaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Audit Process: How to Successfully Plan Audit von complianceonline123
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
complianceonline1231.1K views

Último

December 2023 - Meat on the Bones von
December 2023 - Meat on the BonesDecember 2023 - Meat on the Bones
December 2023 - Meat on the BonesNZSG
23 views11 Folien
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptx von
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptxAmazing Opportunities: PCD Pharma Franchise in Kerala.pptx
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptxSaphnixMedicure1
20 views11 Folien
Integrating Talent Management Practices von
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management PracticesSeta Wicaksana
29 views29 Folien
Nevigating Sucess.pdf von
Nevigating Sucess.pdfNevigating Sucess.pdf
Nevigating Sucess.pdfTEWMAGAZINE
24 views4 Folien
Learning from Failure_ Lessons from Failed Startups.pptx von
Learning from Failure_ Lessons from Failed Startups.pptxLearning from Failure_ Lessons from Failed Startups.pptx
Learning from Failure_ Lessons from Failed Startups.pptxCodeventures
11 views7 Folien
Building Careers at Specialty TRE 2023 von
Building Careers at Specialty TRE 2023Building Careers at Specialty TRE 2023
Building Careers at Specialty TRE 2023Jennifer Sanborn
48 views22 Folien

Último(20)

December 2023 - Meat on the Bones von NZSG
December 2023 - Meat on the BonesDecember 2023 - Meat on the Bones
December 2023 - Meat on the Bones
NZSG23 views
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptx von SaphnixMedicure1
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptxAmazing Opportunities: PCD Pharma Franchise in Kerala.pptx
Amazing Opportunities: PCD Pharma Franchise in Kerala.pptx
SaphnixMedicure120 views
Integrating Talent Management Practices von Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana29 views
Nevigating Sucess.pdf von TEWMAGAZINE
Nevigating Sucess.pdfNevigating Sucess.pdf
Nevigating Sucess.pdf
TEWMAGAZINE24 views
Learning from Failure_ Lessons from Failed Startups.pptx von Codeventures
Learning from Failure_ Lessons from Failed Startups.pptxLearning from Failure_ Lessons from Failed Startups.pptx
Learning from Failure_ Lessons from Failed Startups.pptx
Codeventures11 views
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf von Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang134 views
Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals von altafhsayyednimetler
Top 10 IT Tasks Small Businesses Can Entrust to Offshore ProfessionalsTop 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals
Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals
Monthly Social Media Update November 2023 copy.pptx von Andy Lambert
Monthly Social Media Update November 2023 copy.pptxMonthly Social Media Update November 2023 copy.pptx
Monthly Social Media Update November 2023 copy.pptx
Andy Lambert19 views
Presentation on proposed acquisition of leading European asset manager Aermon... von KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
KeppelCorporation210 views
Bloomerang Thank Yous Dec 2023.pdf von Bloomerang
Bloomerang Thank Yous Dec 2023.pdfBloomerang Thank Yous Dec 2023.pdf
Bloomerang Thank Yous Dec 2023.pdf
Bloomerang106 views
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen... von morshedislam3
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
morshedislam314 views
SUGAR cosmetics ppt von shafrinn5
SUGAR cosmetics pptSUGAR cosmetics ppt
SUGAR cosmetics ppt
shafrinn574 views
See the new MTN tariffs effected November 28, 2023 von Kweku Zurek
See the new MTN tariffs effected November 28, 2023See the new MTN tariffs effected November 28, 2023
See the new MTN tariffs effected November 28, 2023
Kweku Zurek29.5K views
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck von HajeJanKamps
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
HajeJanKamps502 views
How UiPath’s European Founder Kept Control and Built an Expert Board of Direc... von Christian Dahlen
How UiPath’s European Founder Kept Control and Built an Expert Board of Direc...How UiPath’s European Founder Kept Control and Built an Expert Board of Direc...
How UiPath’s European Founder Kept Control and Built an Expert Board of Direc...
Christian Dahlen19 views

Information security threats

  • 2. Information security means that the confidentiality, integrity and availability of information assets is maintained.  Confidentiality: This means that information is only used by people who are authorized to access it.  Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.  Availability: This means that the information is accessible when authorized users need it.
  • 3. Most common types of information security threats are:  Theft of confidential information by hacking  System sabotage by hackers  Phishing and other social engineering attacks  Virus, spyware and malware  Social Media-the fraud threat
  • 4. One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP). Theft of Employee Information  Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives. Theft of Trade Secrets and other Intellectual Property (IP)  Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.  Piracy/copyright infringement.  Corporate business strategies including marketing strategies, product introduction strategies.
  • 5. What is system sabotage? Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system. Who would perpetrate it?  System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.  The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
  • 6.  To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as: ◦ Opening bank accounts in victim’s name ◦ Applying for loans in victim’s name ◦ Applying for credit cards in victim’s name ◦ Obtaining medical services in victims name (e-death)  Other kind of more sophisticated social engineering attacks include spear-phishing.  Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
  • 7. Other threats include:  Smishing: Phishing via SMS (texting)  Vishing: Phishing via voice (phone)  Mobile hacking: Intercepting messages between cell phone/smart phones and stealing data Virus and Spyware  Virus: A computer virus is a malicious software or code that can replicate itself and spread to other computers and can damage a computer by deleting files, reformatting the hard disk etc.  Spyware: It is software that secretly tracks information such websites visited, browser and system information, and computer IP address and transmits the data gathered to the another system.
  • 8. Impersonation is one of the social engineering tools used by fraudsters to commit identity theft. Following are best practices to protect organizations from social engineering attacks:  Broaden company’s online reputation. Blogging is the best.  As part of online reputation management, optimize your company’s listings in search engines like Google (search engine optimization).  If a company identifies themselves using your organization’s photo or bio in social media, be very persistent in contacting their site administrators. They too have reputations to manage and they will often delete stolen profiles as this constitutes to fraud.  Enlist services such as Mark Monitor or other brand protection and trademark management firms.
  • 9. Want to learn more about information security, its requirements and best practices to comply with them? ComplianceOnline webinars and seminars are a great training resource. Check out the following links:  Information Security and Cybercrime Prevention Essentials  How to Manage Ongoing Information Security Requirements?  How to Evaluate Effectiveness of Your Information Security Program?  Auditing Your Information Security Program.  Third Party Information Security Assessment.