Stories by Joan Goodchild

Joan Goodchild's image

Facebook Pwn tool takes profile info, helps social engineers

A group of security researchers based in Egypt have created a tool that will make <a href="http://www.csoonline.com/article/651490/social-engineering-attacks-highlights-from-2010">social engineering</a> easier because it automates the collection of hidden <a href="http://www.csoonline.com/article/print/%1Dhttp://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">Facebook</a> profile data that is otherwise only accessible to friends in a user's network.

Joan Goodchild | 14 Sep | Read more

Using remote access securely

A data-breach-investigations <a href="http://www.csoonline.com/article/679874/verizon-advanced-persistant-threat-is-overblown">report issued by Verizon</a> earlier this year found 71 percent of all <a href="http://www.csoonline.com/article/677537/industry-searches-for-lessons-after-rsa-breach">hacking attacks</a> on business take place using remote access or desktop service.

Joan Goodchild | 13 Sep | Read more

Mobile device security: Questions to ask for creating policy

While 69 percent of organizations have employees <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">using personal devices to connect to their corporate network</a>, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">Courion</a>, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.

Joan Goodchild | 04 Aug | Read more

Many employees would sell corporate information, finds study

A survey of more than 3,400 employees in the United States, Great Britain and Australia finds corporate loyalty be damned, your company's data <a href="http://www.csoonline.com/article/654463/wikileaks-and-the-authorized-insider-threat-">may be on its way out the door</a> when certain employees resign or get laid off.

Joan Goodchild | 27 Jul | Read more

Social engineering: 3 mobile malware techniques

Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.

Joan Goodchild | 26 Jul | Read more

Consumer device use grows, but IT and security can't keep up

IT and security managers are slowly embracing the growing number of <a href="http://www.csoonline.com/article/618163/how-to-adopt-consumer-tech-for-efficiency">consumer devices</a>, such as iPhones and <a href="http://m.csoonline.com/article/686040/iphone-and-ipad-security-4-tips-to-stay-safe">iPads</a>, that are being used by workers within their organizations, but many enterprises are still overwhelmed by the need to mitigate risk and support the devices. That is the finding of new research released Tuesday by Unisys Corporation. The study was conducted for Unisys by International Data Corp.

Joan Goodchild | 13 Jul | Read more

Control mobile access with device management policy

Like CIOs at many organizations, Kenneth Corriveau saw the writing on the wall. The employees in his company wanted to use their own devices for work and were going to keep asking, regardless of what policy might state about using personal technology to <a href="http://www.csoonline.com/article/675735/it-departments-flying-blind-when-it-comes-to-mobile-security">connect to corporate networks</a>.

Joan Goodchild | 01 Jul | Read more

Tumblr hit with huge phishing attack

Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">social engineering tactics</a> that scammers use on social media sites such as <a href="http://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">Facebook and Twitter</a>.

Joan Goodchild | 29 Jun | Read more

Travel security in the Middle East and North Africa

Many of us watch the events in the Middle East and North Africa unfold from afar. But for businesses with operations in these global regions of political unrest, protests, rebel uprising and deteriorating security often force difficult and immediate decisions for the sake of keeping <employees out of harm's way.

Joan Goodchild | 11 Mar | Read more

Securing Google Apps: A CIO Q&A

Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered.

Joan Goodchild | 17 May | Read more

4 reasons why Facebook and vanity don't mix

My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to what some might called undesirable character traits, such as ADHD, stalking and narcissism.

Joan Goodchild | 15 Mar | Read more