<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Twitter Hack Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/twitter-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/twitter-hack/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 16 Jul 2020 22:47:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Twitter Hack Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/twitter-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 037 Insider Threat</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-037-insider-threat/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 16 Jul 2020 23:05:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Twitter Hack]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2195</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 37. This week we&#8217;re going to talk about insider threat. What is an insider threat? Basically it is a member of staff, a contractor or a volunteer that is either being scammed into doing some malicious acts that will affect the company or they are, through their own malicious intent, going&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-037-insider-threat/">#WeekendWisdom 037 Insider Threat</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 37. This week we&#8217;re going to talk about insider threat.<span id="more-2195"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2195-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-037-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-037-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-037-lo.mp4</a></video></div>
<h3>What is an insider threat?</h3>
<p>Basically it is a member of staff, a contractor or a volunteer that is either being scammed into doing some malicious acts that will affect the company or they are, through their own malicious intent, going to do something that causes the company damage.</p>
<h3>Can you give me a for example?</h3>
<p>A perfect example of the insider threat occurred earlier this week. On Wednesday evening, late Irish time, tweets started emerging from verified accounts on Twitter. These were trying to get people to fall for a bitcoin scam and a lot of famous names were caught up in this. What appears to have happened, the early reportage is, that a Twitter employee was either bribed or they were scammed by some criminals to be able to gain access to a tool that allowed them to post these tweets.</p>
<h3>What can I do to protect against it?</h3>
<p>Now there isn&#8217;t a huge amount that you can do to protect against the insider threat. Except:</p>
<ul>
<li>Know that it exists.</li>
<li>Try to limit the access for staff to such powerful tools, as far as possible.</li>
<li>To respect them and treat them properly so that they don&#8217;t try and carry out these malicious activities against your organisation.</li>
<li>Recognise any signs that they may be financially imperilled, that they may take bribes to gain money to be able to carry out these acts against the company.</li>
</ul>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-037-insider-threat/">#WeekendWisdom 037 Insider Threat</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-037-lo.mp4" length="25511478" type="video/mp4" />

			</item>
	</channel>
</rss>
