5 Steps to Building an Audience with #Hashtags
5 Steps to Building an Audience with #Hashtags
12 Steps to Create Videos

How not to hire a North Korean IT spy [Video]

Categories
Integrated Solutions Offering

CISOs are urged to carry out tighter vetting of new hires to ward off potential ‘moles’ — who are increasingly finding their way onto company payrolls and into their IT systems.

Credit: Ground Picture / Shutterstock

CISOs looking for new IT hires already struggle with talent market shortages and bridging cybersecurity skills gaps. But now they face a growing challenge from an unexpected source: sanctions-busting North Korean software developers posing as potential hires.

North Korea is actively infiltrating Western companies using skilled IT workers who use fake identities to pose as remote workers with foreign companies, typically but not exclusively in the US.

These North Korean IT workers use fake identities, often stolen from real US citizens, to apply for freelance contracts or remote positions.

The schemes are part of illicit revenue generation efforts by the North Korean regime, which faces financial sanctions over its nuclear weapons program, as well as a component of the country’s cyberespionage activities.

Multimillion-dollar fake worker cell busted

The US …

How Desire Paths can Transform your Branding and Public Relations
How Desire Paths can Transform your Branding and Public Relations
5 Steps to Creating Successful Ads