Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises? Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market.
Tony Anscombe, Chief Security Evangelist at ESET, tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause.
Presented by Tony Anscombe, Chief Security Evangelist and Cameron Camp, Specialized Security Researcher, ESET
On-demand
Duration: 30 minutes