Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.
So how do you secure people against these tactics? Storytelling, education, processes, and other methods all come into play. CSO's Ultimate Guide to Social Engineering, gathered from CSO's popular interviews with social engineering experts, provides a complete look at common techniques in both attack and defense.
This 13-page pdf is available for download by registered CSO Insiders only.
To continue reading this article register now