In consideration of mode/details of the incidents happened, this is a variant of a particular social engineering attack called phishing and a fraudulent practice called as dumpster diving. As mentioned by M. Kawakami, H.
Yasuda and R. Sasaki, ' 'phishing' can be social/technical engineering attempt to trigger the leakage of sensitive information by creation of sense of urgency and credible situations'. The other attempt can be deemed as ' 'dumpster diving', an illegal practice by internal/external individuals accessing and sewing bits and pieces of sensitive information leading to a formidable data breach' as referred by K. Y.
Abeywardana, E. Pfluegel and M. J. Tunnicliffe. Both of them have a success rate of anywhere between 20 - 30 % and it varies depending on knowledge of the individuals on the company compliance policies and simple acts of securing the information.
These are some
...ways we can make sure the current situation be reverted and make sure proper steps are taken care for the future happenings:
- Dumpster containers should be locked, and proper compliance should be followed for recycling.
- All the miscellaneous office documents no longer in use should be shredded before trashed.
- The employees should beware of messages that create a tremendous sense of urgency may be trying to rush into making a mistake.
- Official organizations don't usually send messages that are full of grammatical errors and spelling mistakes.
- No legitimate organization should request highly sensitive information over email such as your credit card number or account password.
- cyber attackers can send emails that look like they come from boss, co worker, or friend in order to gain the trust.
- Information breach details have to be informed to
the Security Team as soon as possible so that they can take the necessary steps as per the compliance policies. This might involve talking to the employees who have been victims to these scam calls/emails
- Electronics essays
- Computer Science essays
- Consumer Electronics essays
- Enterprise Technology essays
- Hardware essays
- Robot essays
- engineering essays
- people search essays
- Modern Technology essays
- Impact of Technology essays
- Cloud Computing essays
- Operating Systems essays
- Information Technology essays
- Data Analysis essays
- Information Age essays
- Smartphone essays
- Cell Phones essays
- Camera essays
- Computer essays
- Ipod essays
- Mobile Phones essays
- 3g essays
- Bluetooth essays
- Cell Phones in School essays
- Computer File essays
- Desktop Computer essays
- Servers essays
- Data collection essays
- Graphic Design essays
- Data Mining essays
- Cryptography essays
- Internet essays
- Network Security essays
- Android essays
- Computer Security essays
- World Wide Web essays
- Website essays
- Computer Network essays
- Application Software essays
- Computer Programming essays
- Computer Software essays
- Benchmark essays
- Information Systems essays
- Email essays
- Hypertext Transfer Protocol essays
- Marshall Mcluhan essays
- Virtual Learning Environment essays
- Web Search essays
- Etiquette essays
- Mainstream essays