You know that USB key you picked up at the last trade show you went to? It just might be the backdoor to your entire network.
The concept of island hopping has been around for years. This is the technique in which a malicious user accesses a network through a weak link and then from there hops around other systems on that network. It's still a problem and people are finding interesting ways to mix in some social engineering to catch unsuspecting users.
In the latest installment of Security Watch, Jesper Johansson discusses some of these techniques and gives advice on how you can protect your environment against these sorts of attacks.