Unwitting Collaborators, Part 2: Identity Theft and Impersonation
Page 1 of 5
Next >
An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
Read the introduction to this article series.
Like this article? We recommend
Introduction
Gathering information on your competitors is a fact of life in business. And you can bet they do the same to you. But when probing your information network for corporate espionage turns to criminal use of your network to gain access to sensitive information, such intrusions can help malicious individuals or organizations facilitate attacksboth virtual and physicalon our nation's infrastructure.
The problem is that gaining access to your network is easier than you think. It could happen with as little as one phone call.
Page 1 of 5
Next >