WATERING HOLE
- Zinc
- Jul 16, 2014
- 1 min read
Updated: Apr 13, 2024

The cyber equivalent of your standard nature documentary scene, this shady strategy uses employees’ browsing habits against them, infecting oft-visited sites—like the local pizza joint you order lunch from every Friday—with malware. When an unsuspecting user visits this familiar site, his computer becomes infected, giving hackers access to sensitive information. How do you protect from what no amount of internal security can prevent? Goes without saying: back up plans are vital as cybercrime threats become increasingly evasive.