Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

When OOO is TMI – How hackers exploit online behaviors

Every photo we post, status we update, person we tag, place we check-in, and auto-reply message we enable reveals valuable information about our personal and professional lives… information that only strengthens an attacker’s toolkit.

 

As more adults have become active on social media, it’s no surprise, then, that the success of social engineering attacks have increased. In this webinar, hear straight from a hacker on what information they use to hack into companies and from our customer who will explain how they’ve protected themselves from socially engineered attacks and business email compromise.

 

You’ll learn:
  1. What personal and work-related information many of us unwittingly share online
  2. How hackers use this information to socially engineer a personalized attack
  3. What you can do to reduce your company’s hackability
When OOO is TMI – How hackers exploit online behaviors
REGISTER NOW →

Every photo we post, status we update, person we tag, place we check-in, and auto-reply message we enable reveals valuable information about our personal and professional lives… information that only strengthens an attacker’s toolkit.

 

As more adults have become active on social media, it’s no surprise, then, that the success of social engineering attacks have increased. In this webinar, hear straight from a hacker on what information they use to hack into companies and from our customer who will explain how they’ve protected themselves from socially engineered attacks and business email compromise.

 

You’ll learn:
  1. What personal and work-related information many of us unwittingly share online
  2. How hackers use this information to socially engineer a personalized attack
  3. What you can do to reduce your company’s hackability