2020-09-03 15:22:10, AUTHOR(S), Mondaq.Com

Content Categorization
/Computers & Electronics/Computer Security

Word Count:
1010

Words/Sentence:
25

Reading Time:
10.10 min

Reading Quality:
Advanced

Readability:
16th or higher

Media Sentiment
Proprietary sentiment analysis on both the headline and body text of the article. Sentiment scores range from -1 (very negative sentiment) to 1 (very positive sentiment).
RCS Analysis
Relative scoring for Risk, Crisis, and Security language within the article.
Risk Score
Scoring based on the composite risk, security and crisis language within an article compared to a baseline of historic analysis across thousands of diverse articles.
PESTEL Scope
Analysis of article orientation across the PESTEL macro-environmental analysis framework. Learn more about PESTEL.
Entity Word Cloud
Key people, places, organizations and events referenced in the article, weighted by frequency and colored based on contextual sentiment.
Auto Summary
Condensing key features of the article based on salience analysis. Helpful for “gisting” the article in a time crunch.

Since July 2020, vishing scams have evolved into coordinated and

sophisticated campaigns aimed at obtaining a company's

confidential, proprietary and trade secret information through the

company's virtual private network ("VPN") with the

help of the company's own employees.

With the mass shift to large-scale work-from-home environments,

cybercriminals and hacker groups are employing increasingly

creative tactics to take advantage of weakened security protocols

and overly trusting employees.

From an

individual's various social media profiles, the attackers are

able to learn the employee's name, location, place of work,

position, duration at the company, and sometimes even the

employee's home address.

The "visher" gains the

trust of the employee by leveraging the information compiled on

that employee in the research phase and convinces the employee that

he or she needs to login into a new VPN link to address a security

issue or other IT need.

Many companies use VPNs because it not only

provides a secure remote connection, but also allows the company to

monitor employees' activity on the network and supposedly

detect security breaches.

Keywords
Trade Secrets, Criminal Law, Intellectual Property, mondaq, Crime, Cybercrime 2020 – The Rise Of "Vishing", Security, Technology

Interested in Learning More?

Article Analysis is at the foundation of powerful media monitoring and insights. Learn what you can build with powerful curated search engines, real-time listening and trend analysis on the topics, markets and companies critical to your organization.