Biomedical Engineering Reference
In-Depth Information
• Train yourself never to give out passwords or confidential information over the
phone.
• Update your security policy to address social engineering attacks.
• Update your incident-handling procedures to include social engineering attacks.
• Keep all trash in secured, monitored areas.
• Shred important and sensitive data.
• Attend periodic security awareness training programs.
Conclusion
Yet Social Engineering Threats are hardest to counter, they can be moderated in
acceptable levels by adapting suggested safeguards. Concentrating on your pro-
tection, do not give more access to others than necessary. Minimizing the number
of people who have access to confidential files like confidential patient records can
help to reduce the risk but will not eliminate it. Ultimately, social engineers can be
best thwarted by educating yourself. These days risk is in all places. You simply
need to be alive to the risks and stay watchful.
References
1. The human element in cyber security: the worm in front of the screen robert larose,
telecommunication, information studies, and media
2. Robert D The role of the community college in educating the cyber security workforce.
Campbell
3. Keizer G How common is phishing?
4. Barber R Social engineering: a peoples problem. Articon Integralis
5. Social engineering: a thaper
6. Weir GRS, Toolan F, Smeed D The threats of social networking old wine in new bottles
Search WWH ::




Custom Search