{"id":459,"date":"2014-11-11T10:21:00","date_gmt":"2014-11-11T16:21:00","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=459"},"modified":"2014-11-11T10:21:00","modified_gmt":"2014-11-11T16:21:00","slug":"november-edition-of-ouch-social-engineering","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/november-edition-of-ouch-social-engineering\/","title":{"rendered":"November Edition of OUCH!: Social Engineering"},"content":{"rendered":"<p>SANS has released their November edition of OUCH!, covering social engineering.<\/p>\n<p>&#8220;We are excited to announce the November issue of OUCH! This month, led by Guest Editor Alissa Torres, we cover Social Engineering.\u00a0 Specifically, we explain what it is, how cyber attackers use social engineering to get what they want and the different ways people can detect it.<\/p>\n<p>Ultimately, we want people to understand that technology alone cannot protect them; that in many ways, people are their own best defense.<\/p>\n<p>As always, we encourage you to download and share OUCH! with others.&#8221;<\/p>\n<p>English Version (PDF)<\/p>\n<p><a href=\"http:\/\/www.securingthehuman.org\/newsletters\/ouch\/issues\/OUCH-201411_en.pdf\">http:\/\/www.securingthehuman.org\/newsletters\/ouch\/issues\/OUCH-201411_en.pdf<\/a><\/p>\n<p>Translations &amp; Archives<\/p>\n<p><a href=\"http:\/\/www.securingthehuman.org\/ouch\">http:\/\/www.securingthehuman.org\/ouch<\/a><\/p>\n<p>VIDEO OF THE MONTH<\/p>\n<p>==================<\/p>\n<p>For this month&#8217;s video, we focus on healthcare; specifically, the world of mobile devices and how to safely use them in healthcare organizations.\u00a0 As always, you can find the video of the month at <a href=\"http:\/\/www.securingthehuman.org\/resources\/ncsam\">http:\/\/www.securingthehuman.org\/resources\/ncsam<\/a><\/p>\n<p>HEALTHCARE SUMMIT<\/p>\n<p>=================<\/p>\n<p>SANS &amp; NH-ISAC have partnered to help healthcare organizations overcome today&#8217;s complex cyber security issues through greater awareness and information sharing at the Healthcare Cyber Security Summit taking place in San Francisco, Dec 3-4, 2014.\u00a0 Pioneering healthcare CIOs, CISOs and technology leaders will share their experiences dealing with nation-state sponsored threat actors from the pharmaceutical industry. Learn more at<\/p>\n<p><a href=\"http:\/\/www.sans.org\/info\/167532\">http:\/\/www.sans.org\/info\/167532<\/a><\/p>\n<p>Source:\u00a0<a style=\"color: #a30046\" title=\"SANS\" href=\"http:\/\/blogs.luc.edu\/uiso\/2014\/10\/01\/october-edition-of-ouch-five-steps-to-staying-secure\/securingthehuman.org\" target=\"_blank\" rel=\"noopener\">www.securingthehuman.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SANS has released their November edition of OUCH!, covering social engineering. &#8220;We are excited to announce the November issue of OUCH! This month, led by Guest Editor Alissa Torres, we cover Social Engineering.\u00a0 Specifically, we explain what it is, how cyber attackers use social engineering to get what they want and the different ways people [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,6,7,8],"tags":[],"class_list":["post-459","post","type-post","status-publish","format-standard","hentry","category-front-page","category-public-service-announcement","category-published","category-tips"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}