Identity Theft: A Wetbook Pro and Apple Security

When it comes to cyber security, people are the weakest link.  Several years ago I served on a team which designed and launched a cyber security field training exercise (FTX) for an organization with 1,100 employees.  The organization developed several online courses to help employees identify spam, malware, and potentially malicious files and links embedded or attached to emails.  Employees were required to complete the online training during the three months leading up to the exercise.  Finally the day arrived and we launched our attacks.


Continue Reading
Close Menu