Welcome to acmtix.com the home of Acmtix ltd.
Infrastructure monitoring at its best!
Contact me directly at firstname.lastname@example.org
Have a great day!
Enter your email address to subscribe to this blog and receive notifications of new posts by email.
Join 716 other subscribers.
Think about the information you post on Linkedin, technical forums and social media outlets. How could that information be used to hack your environment?
We give out our information to corporations with the expectation that it is being used responsibly and safely. Information has value and we give it away freely.
When a phisher / social media website asks you for the information below, consider what will happen and where that information is being used?
An invader spends time searching forums and technical social media sites for information relating to you and the technical access you have.
Many web developers and application developers leave an easy to follow trail around the internet.
Try Googling yourself and see where your trail leads…
Weigh up the risk of putting that information on a public forum vs the risk of not solving the problem.
With all that information available about you, all it takes is one exploit for an invader/hacker to infiltrate your environment.
The invader can wreak untold havoc on an unpatched, unprotected computer system.
Ironically this post is published to LinkedIn and Twitter.
This site uses Akismet to reduce spam. Learn how your comment data is processed.