Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
The human aspect of security
Tuesday - 9/10/2013, 10:35pm EDT
This week's "Federal Tech Talk" takes a look at security from an "up-close-and-personal" perspective.
How does social media impact your security?
How can you connect social media with physical security?
Today's guest is Dr. Terry Gudaitis.
She has a PhD. in psychology and worked for ten years for a three letter organization as a profiler.
After she left this organization in suburban Virginia, she worked for Cyveillance.
Today, Gudaitis has her own company -- Mindstar Security.
She tells many stories that illustrate some security precautions.
For example, if you join FourSquare and let people know you are on vacation -- this gives attackers knowledge that you are not at home.
Spear phishing is a technique where bad actors take a look at your social profile and send a person a "spoofed" mail revealing personal details.
The object of the attack may let down a guard and click on a link with malicious code.
Malware is now appearing in social media sites like Twitter.
Gudaitis reminds listeners to be wary of any direct messages - Twitter accounts can be spoofed easily and you can accidentally link to sites that are dangerous.