Information Security Manager

Company Name:
Leading Private Professional Services Firm
Design, implement and lead mobile security program to cover multiple technologies and platforms including mobile device standards (hardware, software, configuration management etc), BYOD, MDM, MTM & mobile applications and mobile code.

Protect the firm, its customers, reputation, assets and the interests of stakeholders by identifying and managing threats and risks associated with...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.