Chapter
Office Security Assessment
The speaker follows an individual in an office building to assess their security infrastructure, noting exposed network ports and employees who left their computers unlocked. They also take photos of whiteboards, paperwork, and file names to help determine the sensitivity of the information found.
Clips
The hosts talk about how they found computers that were left unsecured and open at their desks and how this could lead to security breaches.
42:04 - 44:00 (01:56)
Summary
The hosts talk about how they found computers that were left unsecured and open at their desks and how this could lead to security breaches. They mention that the network team should find a more secure way to check for network access and how they took photos of themselves pretending to plug in a device, being careful not to overstep any boundaries.
ChapterOffice Security Assessment
Episode125: Jeremiah
PodcastDarknet Diaries
The speaker describes tailgating and port scanning in a corporate building, noting potential security risks such as exposed network ports and sensitive information left in view.
44:00 - 50:14 (06:13)
Summary
The speaker describes tailgating and port scanning in a corporate building, noting potential security risks such as exposed network ports and sensitive information left in view. The gathering of information on potentially sensitive programs further emphasizes the importance of proper security measures in organizations.