Innovative Minds - On Point - One Group  

5 Post(s) By: MPG Blog

06
Sep
2018

Social Engineering Part 3: Phishing

By:

If you survey your co-workers, chances are high you will find they have received a phishing email at some point. It’s not surprising since phishing is the number one cause of breaches in the world, with an average of more than 46,000 new phishing sites created per day, or nearly 1.5 million each month (Webroot

Read More

15
Aug
2018

Social Engineering Part 2: Open-Source Intelligence (OSINT)

By:

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often than it is maliciously stolen. A scammer’s main goal is to convince you to hand over your information voluntarily, as opposed to using forceful intimidation or threats.” “While hostility is one social engineering methodology, expert

Read More

26
Jun
2018

Guide to Creating a Cybersecurity Challenge for Kids

By:

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick Driggers, from DHS at the Cyberthreat Intelligence Forum, reported on FedScoop. Driggers goes onto ask “So what are we doing to engage K-12”? As a Cybersecurity consulting firm, MindPoint Group (MPG) deals with this industry

Read More

27
Oct
2016

When Perception is Not Reality: Perspectives on State-Sponsored Hacking and Retaliation

By:

NBC News recently reported that the CIA is poised to launch a retaliatory cyber-attack against Russian computer systems. This comes in the wake of multiple hacking incidents that were almost certainly motivated by a desire to influence the upcoming presidential election. In a rare move, DHS and the ODNI have publicly attributed these attacks to

Read More

08
Oct
2016

A Holistic Approach to Insider Threat

By:

Differentiating malicious insiders from normal users has proven to be one of the most difficult security challenges facing the Federal Government as illustrated by high-profile insiders such as Bradley Manning, Edward Snowden and the latest, Harold Martin III. Traditional approaches to this problem tend to focus primarily on technical indicators such as system audit logs,

Read More