Open source intelligence is an area that is often overlooked
and widely misunderstood. It is also known as OSINT as part of the overall
event cybersecurity strategy.
You need to target
your own organization to find loop holes and see where or how you could be attacked.
You are able to identify the information leaking out of your vendor’s
connections to your data or through your own technology before they get to you
1st.
Digitally, you can use OSINT tools to identify everything
you can about the technology and people that work at your organization as well
as use it to see if your sensitive data has leaked online. Trust me, if its
digital it is worth taking as many assets are valuable. But here are the top 3.
Finding the schedules of notable people and their security
details assignments
Being able to spoof or fake credentials online or in a
person.
Stealing personally identifiable information. PII.
Cybercriminals are just like bank robbers in the old days
the follow the money. That is why in this day and age, if you are running a
large public event that draws thousands of people, whether it be at the state,
national or local level, you need to be as vigilant about protecting data as
any business. Otherwise, you will lose your customers.
So, whose job is it to check if it’s safe? You are defiantly
not going to like the answer. It’s your job to protect the traffic and its
contents as confidential and sensitive. It is also your job to have a security
plan that is both digital and physical. Fundamentally, you cannot assume that
safety is someone else’s job.
You can always check in with us on 0211100422 or www.tcgforensics.co.za
No comments:
Post a Comment