Home > Articles > Security > General Security and Privacy

Unwitting Collaborators, Part 2: Identity Theft and Impersonation

  • Print
  • + Share This
An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
Read the introduction to this article series.
Like this article? We recommend


Gathering information on your competitors is a fact of life in business. And you can bet they do the same to you. But when probing your information network for corporate espionage turns to criminal use of your network to gain access to sensitive information, such intrusions can help malicious individuals or organizations facilitate attacks—both virtual and physical—on our nation's infrastructure.

The problem is that gaining access to your network is easier than you think. It could happen with as little as one phone call.

  • + Share This
  • 🔖 Save To Your Account