Would you like to improve your negotiating skills? In this month’s blog, find out how active listening is the secret to any successful negotiation.
In This Issue: “Socially Engineered —Humans”. From Fortune 500 companies, to kids and retirees, and everyone in between, we are all potential targets of social engineers. In this newsletter we examine social engineering tactics, how they are used against us, and how we can all identify them to our benefit.
In This Issue: “The Next Generation of Hackers”. Being a hacker requires curiosity, certain computer security skills, and a mindset for figuring out what criminals will do before they do it. So, where do we look for the next generation of hackers? Find out in the August Newsletter!
We now have a new mainstay in our wardrobes: masks. As masks block much of our face, our July blog gives us some neck-down nonverbals to add to our repertoire.
In This Issue: “Social Engineering, Sales and Ethics”. Have you ever tried to pretend you’re someone else to get the deal to go through? If you have, then you’ve used the social engineering technique of impersonation. Is it helpful? Can we effectively blend social engineering with sales and ethics? Find out in the July Newsletter.
The Human Hacking Conference (HHC) is a cornerstone educational event where you receive expert training on how to hack thoughts, actions, and the people around you. In our June blog we’re introducing you to the HHC 2021 trainers and giving you a preview of their learning tracks.
In This Issue: “The Rise of Phishing Attacks: P.S. I Love You”. IILOVEYOU. Did you ever receive an email with that subject line? Millions did in May 2000. It was a game changer for social engineering, and in fact, saw the beginning of the rise of phishing attacks. Social engineering and cybersecurity have come a long way since 2000. This month, we’re going back to the past and taking a look at social engineering to see how far it has come.
Deepfake attacks – anyone who has a presence on social media is vulnerable. Find out how you can defend yourself and your company against them in latest blog, “Deepfakes: How to Defend Yourself from Attack”.