Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The human aspect of security
Tuesday - 9/10/2013, 10:35pm EDT
This week's "Federal Tech Talk" takes a look at security from an "up-close-and-personal" perspective.
How does social media impact your security?
How can you connect social media with physical security?
Today's guest is Dr. Terry Gudaitis.
She has a PhD. in psychology and worked for ten years for a three letter organization as a profiler.
After she left this organization in suburban Virginia, she worked for Cyveillance.
Today, Gudaitis has her own company -- Mindstar Security.
She tells many stories that illustrate some security precautions.
For example, if you join FourSquare and let people know you are on vacation -- this gives attackers knowledge that you are not at home.
Spear phishing is a technique where bad actors take a look at your social profile and send a person a "spoofed" mail revealing personal details.
The object of the attack may let down a guard and click on a link with malicious code.
Malware is now appearing in social media sites like Twitter.
Gudaitis reminds listeners to be wary of any direct messages - Twitter accounts can be spoofed easily and you can accidentally link to sites that are dangerous.