An interesting article recently appeared on  It uses a fictional company as an example on how corporate information security defences can be breached.  The article, How to Steal 80,000 Identities in One Day, goes through the various stages of an attack, including reconnaissance, identifying the weakest link and exploiting it.  While it is a fictional account, it makes for interesting reading and one that should cause you to review your own security program and to see how best to improve it.  Our take from the article are as follows;


About the Author: bhimport

Let’s Talk

Please leave your contact details and a member of our team will be in touch shortly.

"*" indicates required fields