The Coffee Shop Hack, The Quick-Change Artist, The Vanishing Server, The Indignant Vice President Case 1: The Coffee Shop HackThe traveling salesman working on his laptop in the coffee shop could barely believe it. “I have a personal firewall and encryption on my wireless connection and all my applications. I even use complex passwords! There’s no way my account was used to hack into the network,” he said.“Ah, but it was your account that was hacked, and easily so,” Dr. Kaledjian said. But how?Case 2: The Quick-Change Artist“But it’s impossible,” the guard at the door protested. “No one walked by me with merchandise they hadn’t paid for. The radio tag would have set off the alarm; since the alarm didn’t go off, the shoplifter didn’t use this door.” Dr. Kaledjian disagreed. “The shoplifter walked right by you all right, and didn’t set off the alarm,” he said. “Come to the changing room and I’ll show you.” Why the changing room?Case 3: The Vanishing ServerThe IT administrator waved off the CEO’s concerns casually. “Look, I’ve got that server sitting right here, with its company serial number, C0548, right there on the front. No way a disgruntled staffer left with the machine and posted our intellectual property all over the Internet. He’d have to check out the machine first, and C0548 is on a no-check-out list.” But the CEO didn’t calm down when he heard Dr. Kaledjian say, “The machine you’re showing us is useless, and your employee walked out with server C0548.” How could that be? Case 4: The Indignant Vice President“I can’t believe you’re accusing me of stealing Johnson’s e-mail to see if he got the promotion I deserved,” the indignant VP said. “Hey, check yesterday’s logs! My computer wasn’t on all day. The door access logs will show that I never swiped my card to get in because I wasn’t even here yesterday!” Dr. Kaledjian cocked an eyebrow. “Everything you said is wrong: You were here, you accessed Johnson’s e-mail, and you don’t deserve the promotion. I’ll bring in the human resources director to explain.” For what? Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe