Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools
May 8, 2018
Hosted by Rebecca Herold
Most think of cybercrooks coming from far-away places through the internet. But what many don’t consider is HOW they got a pathway into our computing devices & networks. Often those pathways were established through direct contact with their victims, and their cyber victims often didn’t even know it at the time. So how can such an obvious and out-in-the-open type of hack be accomplished? Well, if you find a USB thumb drive in a library, in your hotel room, or at a restaurant on the table you were just seated at, what would you do with it? Research studies show that most people will plug them into their computers. My guest for this episode created the types of studies that Google, and other large tech company researchers, have replicated in recent years for honey sticks and honey pots to replicate cybercrook tactics. Hear the results of these intriguing research studies that look at the methods cybercrooks commonly use to siphon the data from, and control, victim’s computing devices.
Data Security and Privacy with the Privacy Professor
Tuesday at 2 PM Pacific Time on VoiceAmerica Business Channel
There are more information security and privacy threats than ever before. As more technologies emerge, more big data analytics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers you information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice, news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.
Rebecca has over 25 years of systems engineering, information security, privacy and compliance experience, is CEO of The Privacy Professor(r) consultancy she founded in 2004, and Co-Founder/President of SIMBUS, LLC Information Security, Privacy, Technology and Compliance cloud services. Rebecca engineered the systems and created all the content for the SIMBUS services, which include an automated risk assessment, a learning management system, breach impact calculator (the first to be published in 2002), breach response and breach management automated tasks system, to name a few. Rebecca has authored 19 books, contributed to several dozen other books, and published hundreds of articles. Rebecca led the NIST Smart Grid Privacy Subgroup for seven years, was a co-founder and officer of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group, and is on numerous advisory boards. Rebecca was an Adjunct Professor for the Norwich University MSISA program for nine years. Rebecca has received numerous awards for her work, and has provided keynotes on five continents to date. Rebecca is frequently interviewed, including regularly on the KCWI-TV (Des Moines) morning television show, serves on Advisory and Directors boards, provides expert witness services, and is quoted in diverse broadcasts and publications. Rebecca holds the following certifications: FIP, CISSP, CISA, CISM, CIPT, CIPM, CIPP/US, FLMI. Rebecca is based in Des Moines, Iowa, USA.