
Removable devices are now the number one means of propagating malware. If your clients were to find a thumb drive in the parking lot, their impulse likely would be to plug it in and see what’s on there. But that’s a recipe for trouble.

Good ol’ fashioned dumpster diving hasn’t gone out of style among the data theft community. Throwing away paper documents with important data is just as risky as leaving the network wide open.

Many of your clients may not know it, but copy machines and printers retain a raft of data if they aren’t configured correctly–a fact that could be taken advantage of by malicious insiders or social engineers walking in the door.

Speaking of the door, how many times have your clients’ employees allowed a stranger to just waltz on in behind them without a key card? And, for that matter, how many of your clients even use physical access cards.

They may be fun and useful business tools, but iPhones and iPods pose as much of a threat to the business environment as any other USB-enabled device.

Jotting down usernames and passwords on a bit of sticky stationary may be convenient, but it sure does jack up the risks to the data that those credentials are meant to protect.

The typical office directory is a treasure trove of information for a social engineer seeking to cozy up to unwitting employees in order to gain information to carry out further attacks.

A flower arrangement and a halfway-convincing delivery uniform is better than an access card with unlimited scope to a wily attacker seeking to obtain physical access to office and computer resources.