We live in an age of escalating cyber security threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization’s computer systems via its personnel and not a hack to the computer systems. While not technical in nature these attacks can effect substantial harm on an organization and need to be taken as seriously as the technical attacks.
A classic risk mitigation step on every organizations checklist is to implement thoughtful internal controls with appropriate checks and balances to seek to prevent fraud.
Another classic risk mitigation steps on every organizations cyber perils checklist is . . . [more]