Search:

Type: Posts; User: Katja; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    37
    Views
    24,891

    Okay, so you tell the other company what the data...

    Okay, so you tell the other company what the data should look like and tell them to generate their own testdata. And so they will, and charge you two additional weeks that they will need for...
  2. Replies
    37
    Views
    24,891

    1. Retail is one area where many people can have...

    1. Retail is one area where many people can have access to the same system and often overlooked from a security viewpoint. Especially when people pay with cash, it's quite easy for someone who...
  3. Replies
    37
    Views
    24,891

    Good points, nihil! Very wise comments but...

    Good points, nihil! Very wise comments but unfortunately not everyone listens that well to good advise. Let's consider possible weaknesses in those rules...

    1.) Sometimes several people will all...
  4. Replies
    37
    Views
    24,891

    Hi Agent... The reason why they call it social...

    Hi Agent... The reason why they call it social engineering is because they don't always have to tell any lies. All they have to do is pretend they need help accessing some system. Many people tend to...
  5. Replies
    37
    Views
    24,891

    Well, okay. Other situation then. Person A from...

    Well, okay. Other situation then. Person A from an external colsultant agency tells Staff B that he needs to have a password for system X right now. It doesn't matter if this goes through the...
  6. Replies
    37
    Views
    24,891

    I could imagine a slightly worse scenario. Staff...

    I could imagine a slightly worse scenario. Staff A walks over to the desk of Staff B and asks him for his password because he needs it on some other system. Staff A and B have been collegues for a...
Results 1 to 6 of 6