Page 3 - Telecom Reseller JulAug 2016
P. 3
July/August 2016
Telecom Reseller 3
ALAN GUY MIKE
DAVID
PERCY
BYRD
CLINCH PATTERSON
THE LATEST
TECH BLOGS
TelecomReseller
ADVERTISING
clariication, please visit www.telecomreseller.com and click on Supplement Editor
www.telecomreseller.com
Call: 360 260-9708
Submission Guidelines. Our Editorial Calendar (also online) is useful for appropriate subject matter.
Amy Rails – amyralls@telecomreseller.com Toll Free: 800 667-8965
SUBSCRIPTIONS & E-mail: publisher@usernews.com
Editor & Publisher
Graphic Design
CIRCULATION
Douglas Green – publisher@usernews.com Raspberry Jam Creative – www.raspberryjamcreative.co.uk
NEWS DEPARTMENT
SE 28th Street, Vancouver, WA 98683 Associate Publisher & Director of Advertising
Please e-mail articles and press releases as attachments in Microsoft Word format to jefowen@telecomreseller.com.
Call: 561-732-2335
Carole Sangiorgio – carole@usernews.com The publishers of this newspaper assume no responsibility for statements made by advertisers. in their advertisements, nor do they assume Suggested length is 250-300 words. At the end of the article,
E-mail: publisher@usernews.com
Accounting
responsibility for statements or opinions expressed or implied in the columns please provide contact information. Do not send graphics. We
Tracy Titus – accounts@telecomreseller.com
of this newspaper.
reserve the right to edit for content and length. For further
Phishing The Power of “Old School” Service
and Vishing
(Part 1 of a Two-Part Series)
SJOUWERMAN
A
s the tech industry has exploded over the MICHELLI
past couple of decades and Millennials By Stu Sjouwerman, founder and CEO of KnowBe4 (www.
.part1of3
have risen to power, companies have
knowbe4.com)
innovated wildly to keep up with relentless By Joseph Michelli, PhD, CSP
customer expectations. Better, faster, easier! is
the author of Driven to Delight
Phishing tricks victims, whether at home or in the battle cry. Oh, and make sure there’s an app e Basic Mechanics of Phishing
(www.josephmichelli.com)
the workplace, into revealing private or sensitive for that! It’s no surprise that sleek, streamlined, Social engineering is a mind game. Social
data to an unknown party. Phishing attempts to lightning-paced organizations abound these days. engineers play with human psychology to gain they also crave is an “old school” company that
fool victims into acting on bogus requests for Yes, it is what customers wanted—but isn’t there con dence and win con dential information. takes the time to really know them, engage them,
personal, organizational or private data that only something cold and impersonal about many 21st Cyberthieves use social engineering to realize a and nurture them.
authorized parties should know. Typical phishing transactions?
number of rewards: identity the , nancial fraud, No matter how high-tech service becomes,
attacks occur over email and instant messages, You’re not imagining it. Yes, customers demand or unauthorized access to protected systems.
you’re still serving human beings. Humans don’t
but what began as computer fraud now also the speed and e ciency at an unprecedented Cyberthieves can apply manipulation
want to feel like a URL or a Twitter handle or
targets mobile phones and other wireless devices.
level and those service components are largely
the result of technology breakthroughs. But what
SJOUWERMAN continues on page 11 ››
MICHELLI continues on page 5 ››
SJOUWERMANcontinuesonpage 5 ››